0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:26 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(0x0, 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:26 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:26 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:26 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:26 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x0, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:26 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:26 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:27 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r4, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(0x0, 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:27 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:27 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(0x0, &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:27 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:28 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(0x0, &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:28 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(0x0, &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:28 executing program 2: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(0x0, 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:28 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:28 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:28 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:28 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000680), 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:28 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:29 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:29 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:29 executing program 3: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:29 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:29 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:29 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x2, r3, &(0x7f0000000140), 0x8, &(0x7f00000001c0)) openat$random(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/urandom\x00', 0x40, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000500)={0x0, 0x0, 0x2, 0x0, [], [{0x1, 0xffffffff, 0xffffffff, 0x2, 0x7, 0x3}, {0x80000000, 0x18, 0x8, 0x9, 0x7, 0x8}], [[], []]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x1df) creat(&(0x7f0000000380)='./file0\x00', 0x8) ioctl$TIOCCONS(r2, 0x541d) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000440)) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000280)={0xff, @local, 0x4e24, 0x3, 'lc\x00', 0x10, 0x81, 0x7a}, 0x2c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000003c0)={0x3, 0x70, 0x9, 0xff, 0x7, 0x1, 0x0, 0xcb, 0xa4004, 0x4, 0x3, 0x80, 0x480c, 0x101, 0x81, 0x20, 0xffffffffffffffff, 0xa45, 0x8000, 0x2, 0x3, 0x1, 0x0, 0x2, 0x9, 0xd5, 0x8, 0x6, 0x111d, 0x169c, 0x6, 0x8, 0xfffffffffffffff7, 0x9, 0x9, 0x7, 0x3, 0x401, 0x0, 0xfc, 0x0, @perf_bp={&(0x7f0000000300), 0x8}, 0x401, 0x5, 0x7, 0x2, 0x43, 0x8, 0x3}) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x1, 0x2658, 0x2}, 0xfb) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000340)) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 03:37:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000680), 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:29 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:29 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:29 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:29 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:29 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:29 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000680), 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:29 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:30 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:30 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:30 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:30 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, 0x0) write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, 0x0, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:30 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:30 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, 0x0) write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:30 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:30 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:30 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, 0x0, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:30 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, 0x0) write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:30 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:30 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:30 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(0xffffffffffffffff, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:30 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:31 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(0xffffffffffffffff, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:31 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:31 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, 0x0, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:31 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:31 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:31 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, 0x0, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:31 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(0xffffffffffffffff, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:31 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:31 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:31 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, 0x0, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:31 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, 0x0, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:31 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, 0x0, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100), 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:32 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:32 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100), 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:32 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100), 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:32 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:32 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8", 0x18) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:32 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8", 0x18) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r4, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:32 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ptrace$cont(0x29, r3, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r3}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) r5 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r5, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:33 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8", 0x18) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:33 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86", 0x24) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r4, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:33 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86", 0x24) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r4, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:33 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r4, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:33 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ptrace$cont(0x29, r3, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r3}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) r5 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r5, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:33 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86", 0x24) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000001ec0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:34 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d4", 0x2a) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:34 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ptrace$cont(0x29, r3, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r3}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) r5 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r5, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:34 executing program 5: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() ptrace$cont(0x29, r3, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r4, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r3}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r3, 0x0, 0x0) r5 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r5, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:34 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d4", 0x2a) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:34 executing program 2: sendmsg(0xffffffffffffffff, 0x0, 0x10) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r4 = fcntl$getown(r1, 0x9) waitid(0x2, r4, &(0x7f0000000140), 0x8, &(0x7f00000001c0)) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x400000, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000380)={0x1, 0x0, 0x3, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x1c9}, {r1, 0x0, 0x5d}]}) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x1df) ioctl$TIOCCONS(r3, 0x541d) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000280)={0xff, @local, 0x4e24, 0x3, 'lc\x00', 0x10, 0x81, 0x7a}, 0x2c) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000400)={0x1, 0x34, 0x2}, 0xc) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f0000000340)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r5, &(0x7f0000000440)={'syz1', "e1e2302422423f50a0f2cba623bc87f3313559bc6da9fbe6062b01c7dc868a8284b6b40523ab2caa9486687fdd64b0bbff5efc6b1398f72b06b16ecbe0ddf686ea82b3833f8fb4ec88967e2e580ba5992ebc671b612bdd12fa6fec2653ec888f0374e749075c2598d1a289e53241aae264"}, 0x75) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="02070000020000423a376a6a8c10000000000000000000"], 0x10}}, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 03:37:34 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d4", 0x2a) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000001ec0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:34 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:34 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c", 0x2d) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:34 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:35 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c", 0x2d) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:35 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:35 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c", 0x2d) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:35 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x2, r2, &(0x7f0000000140), 0x8, &(0x7f00000001c0)) write$UHID_INPUT2(r0, &(0x7f00000004c0)={0xc, 0xc9, "1a91d3fe7a94fc71ab4717dc0422a5c98a92af452eb88c96feb53c62f59bd5f420b9804b3b5e4b4ab89520455a1a0f8c343971b4d14ebe6b10d3d106400edaa89ca64dc009b44de0b8715cdc4e511f2c80281647129ed4ac00bf40c019c5bcb22d44592d62eb58e256b8b65b16f4a92fdfe2b2cf6f1a7d6b9f9d4704a81acd03cfe90d00c620d44db0a8e3b365bdb3ba909df4ee99df36f385e494f1dbe041a5a2316662fff9d7d265f15735a4367fe20eff94d9669dd408b72abe45deb0e7ede70d5af47acc96d3b6"}, 0xcf) readv(r0, &(0x7f0000000480)=[{&(0x7f0000000380)=""/195, 0xc3}], 0x1) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x400000, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x1df) ioctl$TIOCCONS(r1, 0x541d) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000280)={0xff, @local, 0x4e24, 0x3, 'lc\x00', 0x10, 0x81, 0x7a}, 0x2c) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x1000000000006, 0x2, 0x100}, 0x37c) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000340)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x4ac04e11}) 03:37:35 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000001ec0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:35 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:35 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:35 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:35 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c27", 0x2e) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:35 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c", 0x2d) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:35 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:35 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c", 0x2d) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:35 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:35 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c27", 0x2e) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:35 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:36 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c27", 0x2e) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:36 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c", 0x2d) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:36 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:36 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:36 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:36 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:36 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 03:37:36 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:36 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 03:37:36 executing program 2: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x2, r2, &(0x7f0000000140), 0x8, &(0x7f00000001c0)) openat$random(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x400000, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$TIOCCONS(r1, 0x541d) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000280)={0xff, @local, 0x4e24, 0x3, 'lc\x00', 0x10, 0x81, 0x7a}, 0x2c) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000380)={0x7fffffff, 0x4, 0x7fff}) finit_module(r1, &(0x7f0000000100)='@-}ppp0system\x00', 0x2) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x1, 0x2, 0x2}, 0xc) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000340)) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 03:37:36 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:36 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:37 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffb) 03:37:37 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:37 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:37 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:37 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:37 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:37 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:37 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:37 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:37 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:38 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:38 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:38 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:38 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:38 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:38 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:38 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:38 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:38 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:39 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:39 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) write(0xffffffffffffffff, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:39 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:39 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:39 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:39 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:39 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:39 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) write(0xffffffffffffffff, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:39 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:39 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) write(0xffffffffffffffff, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:40 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:40 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:40 executing program 4: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:40 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:40 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:40 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000067e359cf9eed000000000000000000000000000000000000000000000000000000000000000000000000000000f41c340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae200"/405], 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96f3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000000020008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000040)={0x100000001, 0x7ff}) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') socket$nl_netfilter(0x10, 0x3, 0xc) write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:40 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, 0x0, 0x0, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:40 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:40 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:40 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000640)='cgroup.controllers\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() timer_create(0x2, &(0x7f0000000200)={0x0, 0x1c, 0xbe5e32588058d17c, @tid=0xffffffffffffffff}, &(0x7f0000000240)=0x0) timer_delete(r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r4}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={r3, 0x8, 0x1, 0x7fff, &(0x7f0000000280)}, 0x20) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r5, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000280)=0x40d, 0x4) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:40 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:40 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000300)=""/154) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) accept$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x6, 0x7fff, 0x4, 0x9a6}, {0x0, 0x5, 0x81, 0x1}]}) nanosleep(&(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0xe14) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffff92) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PPPIOCSFLAGS1(r2, 0x40047459, &(0x7f0000000180)=0x100) 03:37:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:41 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r1 = accept$packet(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') chdir(&(0x7f0000000040)='./file0\x00') read(r1, &(0x7f0000000080)=""/217, 0xd9) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r2, 0x20, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40) 03:37:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$UHID_INPUT(r0, &(0x7f00000002c0)={0x8, "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", 0x1000}, 0x1006) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:41 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffffffffffffa8) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r2}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) mknodat(r2, &(0x7f0000000200)='./file0\x00', 0x1000, 0xa03) getpeername$packet(r2, &(0x7f0000000300), &(0x7f0000000340)=0x14) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self\x00', 0x8000, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') r4 = inotify_add_watch(r3, &(0x7f0000000240)='./file0\x00', 0x1) inotify_rm_watch(r1, r4) write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:41 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:41 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000180)={{0x1, @loopback, 0x4e22, 0x1, 'lblcr\x00', 0x3, 0x8, 0x66}, {@dev={0xac, 0x14, 0x14, 0x2a}, 0x4e24, 0x4, 0x28b, 0x5, 0xc44e}}, 0x44) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:41 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000003c0)=""/154) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSIG(r2, 0x40045436, 0x3a) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000000c0), &(0x7f0000000040)=0x68) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:41 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000013c0)='memory.swap.current\x00', 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000001580)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001540)={&(0x7f0000001440)=@getspdinfo={0xc8, 0x25, 0x400, 0x70bd25, 0x25dfdbfe, 0x7, [@offload={0xc, 0x1c, {0x0, 0x1}}, @algo_aead={0x68, 0x12, {{'morus640\x00'}, 0xd0, 0x1a0, "97b2f5c03ab350ea4bd16abacf34b6e111afbc85cbf8c143f4f4"}}, @srcaddr={0x14, 0xd, @in=@multicast2}, @replay_val={0x10, 0xa, {0x70bd25, 0x70bd2c, 0x70c}}, @encap={0x1c, 0x4, {0x0, 0x4e24, 0x4e21, @in6=@remote}}]}, 0xc8}, 0x1, 0x0, 0x0, 0x8040}, 0x20000000) r2 = geteuid() r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) fdatasync(r3) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f00000002c0)="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", 0x1000, r0}, 0x68) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = request_key(&(0x7f0000001300)='rxrpc\x00', &(0x7f0000001340)={'syz', 0x0}, &(0x7f0000001380)='syz', 0xffffffffffffffff) keyctl$get_persistent(0x16, r2, r4) r5 = syz_open_procfs(0x0, &(0x7f00000012c0)='net/snmp6\x00') write(r5, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) sendfile(r3, r0, &(0x7f0000000240)=0x53, 0x4c) fsetxattr$security_capability(r3, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0xb333, 0x7}, {0xca, 0x7}], r2}, 0x18, 0x3) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:41 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:41 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r1 = dup2(r0, r0) bind$netlink(r1, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfd, 0x4008000}, 0xc) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000001c0)={'vlan0\x00', 0x600}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f00000002c0)={@loopback, 0x7, 0x2, 0x2, 0xfd916a6e7db5ce6d, 0x6, 0x1}, 0x20) getpid() getpgid(0x0) getpgid(0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r6 = syz_open_procfs(r5, &(0x7f0000000340)='fdinfo\x00\xfb\xfc\x14\x94tl\x94d\xff\xe5\xd1!\x97\xcd\xb0\xf5\x02N9g#}\xdd\x92s\xdd\xa2\xde^\x8e\xe1\x86\xdf\x19\xd7\xfa\x88,\xe0\x9c~fe\xa0q\x92R\x0fR\x85\x11\xba\xd2\a\\\xae\x8c\x9doo\x95WEYD\xbf\xf1\x11\xecj\x90\xe9Y\rR\x92\x84\xa6>VjT\xde\xa6\x18?\xd0\x87\b\x00\x00\x00\x00\x00\x00\x00\xc6') write(r6, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:41 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x81, 0x100000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1df, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x10000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) add_key(&(0x7f0000000180)='trusted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f00000002c0)="06a3e6439fab8023a2bd1142426e4f3efe066872a9a415dc28ee2e99f2ceea717e5c714783b8e2aeccddf7b7b9b2e37b972e71d0b4b97dd8748a465d55ead1438fe4d0b4257e6763799840c7520e305ee2bcde5e4b09bf3c8656bdb41d2727555a537039eff07cb75c5d44b88a0c55ef6661eb34ffd72637cd3aae874fe58e8099c89820bfafcc6e892815f884e780343fc1f4d8200de9924d41e4318c8624625c7137aab653ad179ed9155e72b90081af428400736b3be97a72a7d6ca344335d5be4a28e04689c8784d820a9538b9e815c0917ffded59e1d40f", 0xda, 0xfffffffffffffffe) r0 = add_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)="6f00cfa51912a404b9a6fb5fd207bf920ad42db2b2a2c3a4e9e551dd3c5c2c43e565d63fd32a1edcd0013d7a9198b6f041d08521eabe7538e276302562676b347abdccd92934df9ce506c342cda426163001c902c0b49506e3fa8e68a25090b486685a9d4d7319fd84f5eafdd9992b0d5c18b5cdba8cf1465769e9aa38f9773a69c98420e57724fac6325924de8a5ebe923f9e3191bc2a6720ba5cec3a34b0982da26ea4e92948d39ee70a782634c46e054affb902c8fe3b82ce2ece8394bdddeef0964a43803433c6fb43b9423e94d88a6bd8ba5f9df5d5b5c92725bcf6560be679eefbcd48f8", 0xe7, 0xfffffffffffffffc) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/relabel\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x2, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x0, 0x0, 0x0) r3 = dup2(r1, r1) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000200)=ANY=[], 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppoe, &(0x7f0000000100)=0x80, 0x80800) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, 0x0, &(0x7f0000000180)) socket$netlink(0x10, 0x3, 0xf) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r7 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) write$P9_RREAD(r7, &(0x7f0000000200)=ANY=[], 0x5aa78d33) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)) openat$cgroup_ro(r7, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r7, 0x660c) ioctl$PPPIOCNEWUNIT(r7, 0xc004743e, &(0x7f00000004c0)=0x4) syz_emit_ethernet(0x2a, &(0x7f000070aef1)={@remote, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0xb, @broadcast, @rand_addr=0xffff, @empty, @broadcast}}}}, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000040)) add_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000700)="bfbdc0e210b41c15e280b23506410a1246a6e0771f543417f519947e6fc59d41210234aa7b0edb631ab3a1f3ad5aee4976b26eca0cf8856ff6fb88dfd265f1faed94105e6293d4d16d796eed9a560912a5fc810c8f73068a438143e312332cac9db82e8b7e643b5122d54b869aaf65101f9efb7e472cd653853489cda4f765ce59f763edb51ca697c56c10da73bcc5ab5116435bc308cf1f57b19e71658ab43bd9023293465b9fdf8ca31679d007ed1707886f209c75cffdeb77d487ce4009f06e7a44f27d57c05ab9", 0xc9, r0) 03:37:41 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f00000000c0)=""/133, &(0x7f0000000180)=0x85) syz_genetlink_get_family_id$team(0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000080)=0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:41 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) ioctl$ION_IOC_HEAP_QUERY(r4, 0xc0184908, &(0x7f0000000240)={0x34, 0x0, &(0x7f0000000200)}) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:41 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:41 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:41 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1002000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00042dbd7000fddbdf2501000000000000000941000000140018000000027564703a73397a3100000000"], 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r6, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:41 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x80) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:41 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:42 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:42 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fstat(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r1, r2, r3) 03:37:42 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@local, 0x100000001, 0x2, 0x1, 0x1, 0xf7a, 0x8}, 0x20) 03:37:42 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:42 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000240)=0x3) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = request_key(&(0x7f00000005c0)='id_legacy\x00', &(0x7f0000000600)={'syz', 0x0}, &(0x7f0000000640)='eth0\x00', 0xfffffffffffffffc) write$P9_RMKDIR(r1, &(0x7f0000000700)={0x14, 0x49, 0x1, {0x26, 0x4, 0x6}}, 0x14) keyctl$get_security(0x11, r4, &(0x7f0000000680)=""/115, 0x73) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) getsockopt$netlink(r5, 0x10e, 0x7, &(0x7f00000002c0)=""/122, &(0x7f0000000340)=0x7a) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r6}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') r8 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x4, 0x2, 0x6, 0x7fff, 0x0, 0x9, 0x10, 0x0, 0xfe, 0x0, 0x0, 0x76, 0x3ff, 0x4, 0x4, 0xffffffff80000000, 0x9, 0x6, 0xfffffffffffffffa, 0x6, 0x2, 0x1, 0x56f42013, 0x5, 0x80, 0x2, 0x3, 0xe57, 0x5, 0x2, 0x66b, 0x9adf, 0x9, 0x85c, 0x7fff, 0x0, 0x0, 0x401, 0x3, @perf_config_ext={0x2, 0x56}, 0x90, 0x2, 0x800, 0x1, 0x2, 0x20, 0x7}, r8, 0x8, r2, 0x8) write(r7, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, 0x0) sendmsg$inet(r1, &(0x7f0000000500)={&(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="545640e4978a1eb419c56df526a4b4ae18cdccddddcb35d3110f38dc420d46d30c7fcb3a2b11aae4a585b65f752413b5c9b211210f3db46a796f619ca17f70162c65dff327cea8fdc24db99322b176beb0a637c438d3950d3afa4f8eb20eb660fd38663a3ca3126b0de87131b6f7e34c0ba480c82dd738344bf15182c67a092a9a3e7d54e2aa60015a29e85845145e925d3be1f2a86ec76e06ae8f0f0574a0fd608b231b3d3ca6c0a89340cbad159d", 0xaf}, {&(0x7f00000002c0)="a1cec1c80016e19ec8e224db5de672bc7c76e8333a4cd28120ee36bdc49beab21e4561386a84bd17119e50b00834d56462dba6da32574319e00a62b86ab68daf863c49dae909c516", 0x48}, {&(0x7f0000000240)="c5b81cf75f9b417e2764ccc77997ee3d3b9d97ff31228aff3ef61fb5c290751df3b926011cc746ec47", 0x29}, {&(0x7f0000000340)="f02fe380ba98927c7a46e7155d9d01105aba8f450f7e779453cbc01b74d53631a22d931362e3300dcc7b35de15ec2ab17436ca6e455d6bd02fe60d24551b7d205a4606c99fa1472f6a1c7fdb367894d40de9a03dff6f266585fc3d98aa3c47d62ad2eee2298a58270cb417f69d629c75466b22afaf90eed409df3618f00b7f9c912df34a56967548e626d2804d5b44bb27db6ca1009bd23a45ed99339022f77acf54e588bca1caf64d30383c9384518f2e45", 0xb2}, {&(0x7f0000000400)="15753a5b17a8f99d126cb7515d6d3e2f3dab4b4f3569c8bde2bbc664b655da60a4e28a147dc7463a48634eb79477fa847fea9b1dd460dcb7c4854c52c477bf078d146070f466f815ab947ada4ae5dc04520e3685b2", 0x55}], 0x5}, 0x8000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:42 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:42 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:42 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/114, 0x72) 03:37:42 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081c00000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x2050004) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x11f001, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) socket$inet6(0xa, 0x1, 0xf2a) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) gettid() 03:37:42 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:42 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x1, 0x100, 0x100000000}) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x68a) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x44, r2, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}]}, 0x44}, 0x1, 0x0, 0x0, 0xc800}, 0x1) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000001c0)={@mcast2}, &(0x7f0000000200)=0x14) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x90000000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x110, r4, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80000000}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x36}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x40}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x8}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x18}}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2fb}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xd3b5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}]}, 0x110}, 0x1, 0x0, 0x0, 0x4004010}, 0x40008c0) getsockopt$inet6_mreq(r3, 0x29, 0x1f, &(0x7f0000000080)={@rand_addr, 0x0}, &(0x7f0000000180)=0x14) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@empty, @in=@local, 0x4e20, 0x0, 0x4e22, 0x1, 0x2, 0x20, 0x80, 0x3c, r5}, {0x82f, 0x3ff, 0x1, 0x92d7, 0x805, 0x401, 0x4}, {0x2, 0xfffffffffffffffb, 0x8001}, 0x9, 0x0, 0x2, 0x1, 0x3, 0x3}, {{@in6=@empty, 0x4d5, 0xff}, 0x2, @in6=@remote, 0x0, 0x1, 0x2, 0x5, 0xb34, 0x7f, 0x10000}}, 0xe8) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000000a00)='/selinux/mls\x00', 0xffffffffffffffff}, 0x30) r7 = syz_open_procfs(r6, &(0x7f0000000b40)='n\x8d\x1a\x97uoftnet\x84\xc9\xad\xf5\xabm3\xc5v_stat\xf9\xe1\xd6\xb0\x8f\x9b*`\x95\xfe\xc3v!\xbbM\x9e7\ay\n\xd2%\xe1S(\x8aD\x01\x96\x03C3IH\x9d\xed\xe7\x80\x19\xe3;\x15\x82?\xce\az\x88\xb4\xa9\xe1\xf3X\v\xceR\xa1\\\xa6\xa7\xf9&)_\xd0\xef\xfa\x02\xdc\xd2q}\xf2\a\xe1\xf64\xa2N\xad\x03b\xc94\xfd\x16\xf9\xe35.\xb6\xe5Q\x7f\xb6E\x9dkz\xe8ax\x9ay\xa6T\xa4\f\x14\xce\xfc') write(r7, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:42 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) dup2(r1, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r2 = accept$packet(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f0000000080)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000040)=""/25, 0x19, 0xffffffff, 0xc2, 0x7, 0x5, 0x80000000}, 0x120) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:42 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:43 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x43) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:43 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) accept$packet(r1, 0x0, &(0x7f0000000180)) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000340)=0xf51b) syz_genetlink_get_family_id$team(0x0) listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/157, 0x9d) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') mkdir(&(0x7f00000001c0)='./file1\x00', 0x1d4) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) select(0x40, &(0x7f0000000040)={0x81, 0x1000, 0x0, 0x2, 0x1, 0x7fff, 0xfff, 0x100}, &(0x7f0000000080)={0x1f, 0x1200000, 0x7620, 0x5, 0x3, 0x9, 0x4, 0x3}, &(0x7f00000000c0)={0xfffffffffffffffa, 0x800, 0x100000000, 0x80000001, 0x2, 0x2, 0x140, 0x4161}, &(0x7f0000000140)) 03:37:43 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:43 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = fcntl$getown(r1, 0x9) capset(&(0x7f0000000100)={0x20071026, r4}, &(0x7f0000000200)={0x3ff, 0x7ff, 0x6, 0x0, 0x26, 0x7fff}) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r6}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20800, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000180)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:43 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) execve(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300), &(0x7f00000003c0)=[&(0x7f0000000340)='GPL\x00', &(0x7f0000000380)='-\x00']) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x84000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@RTM_NEWNSID={0x2c, 0x58, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8, 0x3, r2}, @NETNSA_FD={0x8, 0x3, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendto(r0, &(0x7f0000000100)="dc54092132a67acd117519674457904ac230a433b9aa76405f176967e1096a695e13d6a7c66ec232009e5e782252cbf4ed1571b2143ff6ba862b806fe966c2df59a43a0a20746f40cf6f6f25f8e0520c2d52cf0dfebb", 0x56, 0x4000800, &(0x7f0000000180)=@caif=@util={0x25, "1a34fef9439ad2f3347ef0db45a6c899"}, 0x80) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f00000000c0)=0x54) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000400)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000500)=0xe8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:43 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000380)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r1, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:43 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000480)=""/154) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000325bd7000ffdbdf25020000001400090000000000000000000000ffffac1e0101ff17c4b902b7c812d2955e330ac897cf42aa046d7811bb55dcd72e52b12daddbefe69319b82fd9cd8f365470becefc33b168db30868d54f97713f5b176b4fee17d8e9b618302ab2a49d2d5aed09a95006eb5d6c11840daff787b37361184875eb47a9cc65c77ff781faa943913519e42e7c35dfe5d4a4707a64bbf769775641611314d59a1d762"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) readlink(&(0x7f0000000240)='./file1\x00', &(0x7f0000000280)=""/121, 0x79) fchmodat(r2, &(0x7f0000000140)='./file1\x00', 0x3a) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x2, 0x0, 0x9, 0x1}, {0x1, 0x10000, 0x6, 0x3}, {0x9, 0x6, 0xd41, 0x80}, {0xbed, 0x3f, 0x4897, 0x7}]}) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:43 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) r1 = gettid() fcntl$lock(r0, 0x27, &(0x7f0000000080)={0x0, 0x0, 0x3, 0xec9, r1}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:43 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x5) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0xfffffffffffffc01, @dev={0xfe, 0x80, [], 0x25}, 0x7ff}, 0x1c) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2002, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:44 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$VT_WAITACTIVE(r1, 0x5607) 03:37:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200100, 0x1) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={'veth0_to_hsr\x00', {0x2, 0x4e22, @local}}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000180)=0x4) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='smaps\x00') sendfile(r3, r4, &(0x7f0000000000)=0x100000, 0x10000) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000240)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r5, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:44 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r4, &(0x7f0000000080), 0x1c) r5 = dup2(r4, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000040), 0xab95a) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = gettid() setsockopt$inet_mreqsrc(r5, 0x0, 0x28, &(0x7f0000000100)={@multicast2, @remote, @empty}, 0xc) ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x28) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) 03:37:44 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, 0x0) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:44 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:44 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:44 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x40100, 0x0) write$cgroup_int(r0, &(0x7f0000000640)=0x5e, 0x12) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x84, r3, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x400, @remote}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000001}, 0x8001) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r5, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r6}) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r7, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x44000, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000001c0)=0x1, 0x4) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f00000003c0)=""/240) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'ip6tnl0\x00', r3}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:44 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0xfffffffffffffff6, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000002c0)=""/130) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000180)=""/155) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000240)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:44 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:44 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'hwsim0\x00', {0x2, 0x4e23, @remote}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r1, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:45 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = fcntl$getown(r0, 0x9) r5 = syz_open_procfs(r4, &(0x7f0000000200)='fdinfo\x00') write(r5, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:45 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:bin_t:s0\x00', 0x1b, 0x3) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000300)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000240)=""/107, &(0x7f00000002c0)=0x6b) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') setxattr$trusted_overlay_redirect(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.redirect\x00', &(0x7f0000000440)='./file0\x00', 0x8, 0x2) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r2, &(0x7f0000000040)="16d3190d476eb89960378bbcbe69ac380b0502537c7ba7192d90c08496f1130f9b8490edcb86ac6a5d86e524096fee25bc7a8c80f9b46ac790162aff8c9748ba802d60a22c92e40cf55864c43c91a772c358a8a06c02fe1f7242c833acc90f55e806d9b21ef2f672", &(0x7f00000000c0)=""/237}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x20000000) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$P9_RRENAME(r1, &(0x7f0000000200)={0x7, 0x15, 0x1}, 0x7) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) nanosleep(&(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000001c0)={{0x3, 0x3, 0xffffffffffff0001, 0x1, 0x8}}) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:45 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000300)='.request_key_auth\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)='eth1eth0*^cgroupem1\x00', 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@ipv4, 0x0}, &(0x7f0000000240)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000002c0)={@loopback, r2}, 0x14) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r6, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:45 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:45 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7974178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3000000000000000000"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0xd298f68408a498a5, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000240)={0x0, 0x0, {0x13, 0x18, 0x17, 0xa, 0x5, 0xffffffff, 0x6, 0x168}}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x880, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x4, 0x8, 0x3, r4}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockopt$inet6_int(r4, 0x29, 0x3d, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x40, 0x0) write(r5, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0xfffffefa) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x40000000003ffffc) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = dup3(r0, r0, 0x80000) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000700)=[@mss={0x2, 0x2}, @window={0x3, 0x7fff, 0x129f9e01}, @sack_perm], 0x3) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000740)={0x0, 0x0, 0x7, 0x0, 0x7fffffff}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) write(r0, &(0x7f0000000840)="6c307e7e232c51b5fddb26b185fc1368b196d9aac135572ce628d2ae704505918ce78010805bcddb989ea6ad48653a8edf4827525661532fe03dc332b55dce3f66a8f2d25c387f8a9389347de669f4e72860252c6968d6", 0x57) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) accept4$unix(r1, 0x0, &(0x7f0000000800), 0x80000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000080)={'ip6erspan0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}}) write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000900)={0x3, 0x7, 0x6, 0x101, 0xe, 0x3f, 0x706, 0x3f, 0x4, 0x3, 0x0, 0x3}) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x1cba, 0x1}) execveat(r4, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000200)='ip6erspan0\x00', &(0x7f0000000240)='fdinfo\x00', &(0x7f00000002c0)='/dev/loop-control\x00', &(0x7f0000000300)='ip6erspan0\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='eth1loposix_acl_accessmime_type-wlan1securityvboxnet1\\,proc\x00', &(0x7f00000003c0)='/selinux/mls\x00', &(0x7f0000000400)='cpuset[GPL\x00', &(0x7f0000000440)='/selinux/mls\x00'], &(0x7f00000006c0)=[&(0x7f0000000500)='syz', &(0x7f0000000540)='\x00', &(0x7f0000000580)='ip6erspan0\x00', &(0x7f00000005c0)='/dev/loop-control\x00', &(0x7f0000000600)='/dev/loop-control\x00', &(0x7f0000000640)='&vmnet1@\x00', &(0x7f0000000680)='&vboxnet1-]{vboxnet0\x00'], 0x400) 03:37:45 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000040)=""/254) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x57, 0xd, &(0x7f0000000140)="6ec865fab63c0ea0f9808b0bc0b7c3e30c225a82fb4fe50c20bd4537452de8f2c7d38b2173d21348decad2fb8bd6091a1d62e3b505913f5a08a69a02c2315268326d6ac0fd11294a33200cefa1452372c7d5865e43b403", &(0x7f00000001c0)=""/13, 0x80000000}, 0x28) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x15e) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:45 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) r1 = dup2(r0, r0) write$P9_RREMOVE(r1, &(0x7f0000000080)={0x7, 0x7b, 0x1}, 0x7) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000180)={'syz1', "cb32bb1c9aafef2de11e19a57b38c0a3a4953590cb37dee914a9f0e010ca7454d67fc17adae2edc1c970f40cb46dbdd7055fe441a29a2a10a952dc97b6de68da79fd41320c6b6a81ddff36024b15a9"}, 0x53) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:46 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0xa36, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x4) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r6, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_open_pts(r0, 0x80000) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x6c76, 0x0, 0x1, 0x100000000}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:46 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:46 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cbd2dfeadcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:46 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:46 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000080)={'team_slave_1\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xd}}}) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:46 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000040)={0x9, 0x1, 0xc888, 0x0, 0xa, 0x9, 0x10000, 0x9, 0x401, 0x8}) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:46 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000001c00000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867ea107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a2e10373bda9651a3db9284178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x70010000) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) recvfrom$unix(r2, &(0x7f00000002c0)=""/135, 0x87, 0x20, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) setsockopt(r4, 0x9a83, 0xfff, &(0x7f00000005c0)="d80a3607d501dd3b751f0f2407ae248fc826cae0d8dbed9a00ed247bf4fc744edafaa1534518ed24cae24575973f697deda20b6dbee46761c5dc6140a8a0ac37e5f84006ee292013cbad33ee39aa7fd65c7f0c80633100b634655d675e31dc4454f7879ac7f079e2301508cccac3d254b256371664fa0651d59e4837fcf7c217080bd589f65da19c0fe5637aab9e24ede65289bff0786fe15f876908844d06589b493fbeccb70652223383ed674f4d6bce20ee48e66b8215ae378ee7cad93bd0edbd5808c3788f2c7a0c368436b10581024f80c8fd2f558980381eae9d13c6c0b0b52a4420fce43293799647576390", 0xef) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:46 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:46 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000200)='id_legacy\x00', &(0x7f0000000240)='/dev/loop-control\x00') prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) r4 = fcntl$getown(r0, 0x9) ptrace$peek(0x3, r4, &(0x7f0000000080)) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:46 executing program 2: socket$packet(0x11, 0x0, 0x300) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x84000) r1 = accept4(r0, 0x0, 0x0, 0x801) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) sendto$inet6(r1, &(0x7f0000000880)="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", 0x1000, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$SNDRV_TIMER_IOCTL_INFO(r3, 0x80e85411, &(0x7f0000000040)=""/137) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000080)={0xffff, 0xce60000000000000, 0x5}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:46 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:47 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:47 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0xffffffffffffffff, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:47 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:47 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) syz_read_part_table(0x8, 0x7, &(0x7f00000024c0)=[{&(0x7f00000002c0)="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", 0x1000, 0x401}, {&(0x7f00000001c0)="112f0a352f5db4", 0x7, 0x6}, {&(0x7f00000012c0)="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", 0xfd, 0x2}, {&(0x7f00000013c0)="669d289b0418d3394bda599942bbdc68bab697ad356d8abf3ea2b87b1c7535e75a1dd65dd1947056a2f0e6c1610a61239e8b0ca3f6da1543a0a32c13b4c4de28428ea8851157965259953914ae612a7ed519f4b6b5e30c778a186d1d6d2aad4ed052f7cda328b1c8fcdd800b308c09d3dbd59b3cd18f7d042df075e35cfcc5d60791298ff32197a14e16ad3dfa3a85c57749fa1b7a20af4c853feb5224f4d8ac1435751b2ef8b32bda14364e79b07b6e63db452fd607fdfc20e8d0baa72ff9e1", 0xc0}, {&(0x7f0000001480)="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", 0x1000, 0xffff}, {&(0x7f0000000200)="c18cc63ba25c92abaf12f1a57aba957a19c207c53563a7ab5ca4b897d04fab3594322c20154891dae45d06e1442a8523c5077fe08fc1af95f74199a06fe28efbcffacebd34c2126997ddf49d68a3ebcd9a0c2a7e733c4eeabd9b6fab3467fa472b3723820ca698134c350b1d13febf903a5ec5", 0x73, 0x5}, {&(0x7f0000002480)="0a4636a156b45eb677", 0x9, 0x8}]) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@remote, 0x80000000, 0x1, 0x2, 0x2, 0x7f, 0x5}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:47 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/255, 0x443}], 0x1000000000000110) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) r3 = dup3(r2, r1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0xf00, 0x70bd2d, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8010}, 0x80) write(r1, &(0x7f0000c34fff), 0xffffff0b) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:47 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000001540)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYRES16=r0, @ANYRES64=r0], @ANYRESOCT=r0], @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=0x0, @ANYRES16=r0], @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRESOCT=0x0], @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR64, @ANYPTR64, @ANYPTR, @ANYPTR, @ANYRES32=r0, @ANYPTR64, @ANYRES16=r0, @ANYPTR]], @ANYRES32=r0, @ANYPTR=&(0x7f0000001500)=ANY=[@ANYPTR=&(0x7f00000014c0)=ANY=[@ANYRES16=r0, @ANYPTR], @ANYPTR64], @ANYRESOCT, @ANYRESDEC], 0x6) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r3, 0x710, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x40000) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x200000000005) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:47 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000040)=0x7) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:47 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x101100, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000300)='cubic\x00', 0x6) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r5}) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="030f5ae0052f546b"], 0x8, 0x2) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r6, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:47 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) socket(0x14, 0x80000, 0xe5) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r1, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:48 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0xffffffffffffffff, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:48 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) fcntl$setsig(r0, 0xa, 0x36) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write$P9_RRENAME(r1, &(0x7f0000000080)={0x7, 0x15, 0x1}, 0x7) write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:48 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000002d40)='id_resolver\x00', &(0x7f0000002d80)={'syz', 0x2}, &(0x7f0000002dc0)='mime_type\x00', 0xfffffffffffffffb) request_key(&(0x7f0000002e00)='syzkaller\x00', &(0x7f0000002e40)={'syz', 0x3}, &(0x7f0000002e80)='selinux)eth0.wlan0\x00', 0xfffffffffffffffc) r1 = request_key(&(0x7f0000002ec0)='.dead\x00', &(0x7f0000002f00)={'syz', 0x0}, &(0x7f0000002f40)='/dev/loop-control\x00', 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r4, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r5}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) sendmsg(r4, &(0x7f0000002c00)={&(0x7f0000000200)=@rc={0x1f, {0x7ff, 0x5, 0x8, 0x7, 0xe30d, 0xef}, 0x20}, 0x80, &(0x7f0000001940)=[{&(0x7f00000002c0)="05696bcecb9950440a952865a3eecd584fc29ab26cae3b4167b61106721ac3a3bf6ea760ae5530bce4c10842c99a90d32644e1aa06772232f745a9d3a039d8b61ebc71d58918ea9bdaebd40dda60ad16b4214f3787f032f63d47e60dca2440434ce6fc8cc0609453f0168340e7e50ea6d2ae6cce8fb2b988b4223a73863af32330fb6aea20bd53aa9b50c0a0732c27ee7bea7667e4436629e5a2490c52b93aef40c088c7bef994a798178a6b4a9224421a4377f6aabf20ad15d46588f95f849fc4bf10ed333e19b7717b46b081c7f5d1c40a0066b61538ab4ffade73316709", 0xdf}, {&(0x7f00000005c0)="7135bf76666d27531e903653df21e521981fdca4917ad1b979e11a2e51fff1b2013d5ab7ced28c2775f9241e6d008111d62ab233fa16206cd6d0055026b25090c988dc8cc206", 0x46}, {&(0x7f0000000640)="4ab1f2f01f23cbee0b91ae0b652142296674a5dee5caaedfa99b7f59534800127496738d8b0c55d2d5d09069bf3a2222d1059c77b5218aab4694298c42dca0c291acef122796d5a6ed042f41f4da591f088eed3ea9ef126d39859504dbbb3710a1c2d4a6c1441f445155a3d301e12a388a7aaefc14abd4f23adf736fe0351c267fbe583b3c3ec18886f7138314e0b7c5287f1152d5f7448797f28ef1b426ac1cbdeb8a0511", 0xa5}, {&(0x7f00000003c0)="d55b7769e53aa82127a0d5475809367275fee16f7f55d23eba9f6289b133ed6b94e8639bc04e2c8373", 0x29}, {&(0x7f0000000700)="be3314459a70acc0883a9d3a8bc4209875843eeaae0838a3667101f049acc377bc8abc53a324381f5fa8563c00eac9e9351db04e62b3d49306017722d49a0ab147d869cca6010c929f630e5fe369999cee93c2f0a852a2293a53a9e5", 0x5c}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="c7fd7146205901869a74f95ec096ed7a6fc2473a3d562ee8c7b84de9f71c9ec186764d9692af52654b9dd0eee27b695480495868a7985687a054b9ad4a946a0da121c8afc21570116de8eae40c373dcf03ba5b7e548bbdff905ea8ef1c07d28c44b241fb52942f7c2daa6579899754abd587218ac4c2127d2507960f2d5b155405bdde2215a288cd611fbeebbdeec36d8480e8cebcae99dbade472e50d3a0e99140af33782754e7d82d8e72a5d0f8f12965cd38f402b060ce024aad722e440538373139511b3a209e1367503d64a4de0167ae85011fc", 0xd6}, {&(0x7f0000001880)="3524382c72debca3fae02a94721e4d648ce48891899aac8342adb37c54d1cd37347ca949ae122a841e8ed5425b48d3a94866d5556ce1cb90e9766ee7fef12e63dee630def00c8e10ea45aa1edbba6075e6bb8c634b2f8517eb7c4cbba5acec02f7e7d664e1ba7f0dd6ecf1ed9745c858d37496a22cfa27498732c10f84f92086f9ec77424caab7df8b44ecba84c526eab39cfb639ca81bb086ae714fca419581ac6fae998a179fa4dc21f3d048fa52e5ca4d2c2393f606014d", 0xb9}], 0x8, &(0x7f00000019c0)=[{0xc8, 0x113, 0xffff, "fac4ad718e6acce0b27950e9c4ccae83a8a2c72f55baf694dae7fa255a83c1aaf936949b1a50e7442d0eedaa5af4140665feec60bf783f248878721e6609da0b5cdc98d7e01b415312a5b8a8521e230302f094a427f7882b2064d322046d466f2789bf3bbf315a966a4a4c5b039823ccdb9216c9894304138e9d01d41b7b11aa7699ede26fe087e3ee89082a851b450c5a73b4ec0830a7c1cb410cf8d3a623086205d14a07d7bd084195c05514e01fcb534a"}, {0x1010, 0x10b, 0x6, "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"}, {0xf0, 0x1ff, 0xff, "b1db1cd216dacb7854ed51ed07572ef90c8fd5d133e6c2559e8e2926768df2f48a3118e9bb1a07c1ed1a3e3e3305e74c2cd872b7c4aee8b133f7a2aef0af6908a97f113d6317fa0676d6527ee10add3a6fac4fc322385b7ed5eb7be39cf453f4d2db2a2b45823f26978cbbc5f803cdda24cc9c8fefa96832105067a4ac54a13d64143e5fbcbe91329bf38db9a139267b9cb7d21ba18cf6cdb5d8af3336399c18619a3a2ef8afa12664b5380124f5130d0a5d426c868f612def694d37015c60873a532096c429951e5d5d38ea28b14372877fc4d7195d11f5ac7eb839"}, {0x78, 0x105, 0x4, "d59a6a8f003e5996834de525a8667295356976edd192233acffe46081899eb8b0b14dfb4936d0fbb5892b32bd5c109e6350ce7035651365a9b490a563ea42f41ef5e47075915b5bf5b395a03c1fc7d691a35985377141a028903192fcb0dbe6125ca"}], 0x1240}, 0x8000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') sendmsg$nl_route(r4, &(0x7f0000002d00)={&(0x7f0000002c40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002cc0)={&(0x7f0000002c80)=@ipv4_newroute={0x24, 0x18, 0x23, 0x70bd25, 0x25dfdbff, {0x2, 0xb0, 0x20, 0x200, 0xfe, 0x3, 0xfd, 0xf}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) write(r6, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:48 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:48 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000180)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000080)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:48 executing program 2: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x3ac) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') getsockname$unix(r3, &(0x7f0000000200), &(0x7f00000000c0)=0x6e) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x19) write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0xfffffffffffffffb) 03:37:48 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:48 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0xffffffffffffffff) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[@sack_perm, @sack_perm, @window={0x3, 0x20, 0x6}, @timestamp, @timestamp, @window={0x3, 0x3, 0x6}], 0x6) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r1, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f0000000540)=""/154) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fstat(r2, &(0x7f0000000040)) accept$packet(r0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(0x0, r3, 0x0, r2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:49 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$unix(r1, &(0x7f00000002c0)=@abs, &(0x7f0000000240)=0x6e) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r4}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r5, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0xffffffffffffffff, r4, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:49 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x880, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r0, &(0x7f0000000080)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 2: r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) accept4$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x800) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@dev={0xfe, 0x80, [], 0x200}, 0x3a, r2}) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:49 executing program 5: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000300)={0x8, 0x8}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/loop-control\x00', 0x4, 0x0) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) getpeername$inet6(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') accept4$inet6(r4, &(0x7f0000000240), &(0x7f00000002c0)=0x1c, 0x80800) write(r5, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) bind$inet6(r5, &(0x7f0000000080)={0xa, 0x4e24, 0x6, @remote, 0x8}, 0x1c) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000180), 0x4) 03:37:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:49 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)=0x0) sched_setparam(r0, &(0x7f0000000200)=0x1) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000180)="c71ecb99cdb4906d3af023f342f14ef1", 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r3, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x105080, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000140)=@ipx={0x4, 0x0, 0x4, "7ce7e6929613", 0x10001}, 0x80, 0x0}, 0x4040) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xf4fffffc, 0x0, 0x0, 0x1, 0x0) accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x87, @loopback, 0x4e21, 0x2, 'nq\x00', 0xa, 0x2, 0x73}, 0x2c) ioctl$KDSKBLED(r2, 0x4b65, 0x4) 03:37:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r2, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) futimesat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x7530}}) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo\x00') write(r1, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) [ 426.740932] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:37:49 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='fdinfo\x00') setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r1, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040)=0x10000, 0x4) 03:37:49 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r3}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x8d, 0x2, 0x8001, "2789ab054357b4a99805ba2f7e64990f", "37496946bb418a5ec599470f00b7fd43c8c52a33caa58b56c7af789a5643ec47f6f0763a22d686f2d1f3b59f535c9cb73736c3178d85e49bcbe8caa3a4f5525a63e7146e55c36df0deb02c748d89af9e0245c884b0180a58af668c863eefab407a96b14ada7852bb3da51ecb1bfc42041da80ec18a0070e1"}, 0x8d, 0x2) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r4, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:49 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:49 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, 0x0, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff344, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[], 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x0) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') write(r1, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) 03:37:50 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) ioctl$RTC_PIE_OFF(r5, 0x7006) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) mkdir(&(0x7f0000000380)='./file0\x00', 0x200000000000002) getpid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') init_module(&(0x7f0000000080)='\x00', 0x1, &(0x7f00000000c0)='[^GPL#)\x00') perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000001e00)=@caif, &(0x7f0000000680)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001e80)={0x0, @rand_addr, @multicast2}, &(0x7f0000001ec0)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x1a0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BLKPG(r2, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'syz_tun\x00'}) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6}, 0x0, @in=@dev}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000500)=0x40) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x8001) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, 0x0, &(0x7f0000000980)) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/106, 0x6a) getpid() perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:50 executing program 2: accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000080)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$team(0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:37:50 executing program 1: openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, 0x0, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000005c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x84, r1, 0x204, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x25db}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe8bf}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x84}, 0x1, 0x0, 0x0, 0x4004010}, 0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x10080, 0x100) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f0000000380)=""/130) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x26e, 0x0) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000180)) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() ptrace$cont(0x29, 0x0, 0x400, 0x10000) wait4(0x0, 0x0, 0x80000000, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$TUNSETCARRIER(r5, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$EVIOCSMASK(r5, 0x40104593, &(0x7f0000000300)={0x17, 0xca, &(0x7f0000000200)="0a679a88f836fa74444d44de15822d6e45129cc2f87c14fa0b5b58440a25fddb702925cb218f83949f54cfab997e3195caa0c24254a0680fe48f6a8cc584bf78e55d40409a32574885ceab3d047673405c09fad1e84e4451f46f1b88a6088725ac3951935a15dcd000e78e64e3e7106fa9fd38d73b1eb0027045aaec007be4d54463a5801a72c2cd625468febb8db0bdf255b4b8bfabee7f5c5634ae44344c5b13086f96cc5e7582ef6e89eb77f52fc543bc7f402835b3b1defbe89a71e25da497b08dd3f79fc415401c"}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x6, 0x7f, 0x20000000, 0xa8, r4}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r4, 0x0, 0x0) r6 = add_key(&(0x7f0000000600)='cifs.idmap\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f0000000680)="40a2a4d25eca169ef855cc8b04666c84d708ba31fa09219099fec38065c70ba6d26c8e807be677bf8a4a36c86b8e7870ff2cfd6b9a3425c8428ba61f3eacfb3339aa448bbccbff125525e2b9ad6bb93973df2913e284c3641e96f4512582f82c52b58f79b07a40c9b4b39b75aa9faf4053b161aac5c79af6f5393da316c07584bf3b4bf08763a769f797fe4fa62ffa16a4e1939f10ad5efa33b2822dee7c811c861908b96ccb7b269183785f09364f7f2375f86fa122c889ba8aa421a52b881c5ce1f751ea3197e22d1c7672ad56b467e730189ef3f99750850d123a77446e35affa151331e1d01f129f60b0821ad2425420c4", 0xf3, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000780)={r6, 0xa6, 0x69}, &(0x7f00000007c0)={'enc=', 'oaep', ' hash=', {'sha384\x00'}}, &(0x7f0000000840)="18527838ccadcf37929713eee6711f251d0206dc98c08160a708a1c05fec08a109a7c1b93c032a57d4ddd42a67e7f2a45f8f9a6deba9eb33cd8e52d498efb278ff7efbd3f76ba721b8069bc06b0f335eb039eb28443817aff5cf989dcdfcb994e3dab0d166aa2edf04938a624aec2327594b4c027e974f0568f17d8402445003bd1a7546cc0b1ad8d751e71bae534b978a6cd5c71de5af43eee25fc2da0bb695f5b02f2dc737", &(0x7f0000000900)=""/105) 03:37:50 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xfffffffffffffdcb) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000980)='map\x84\xc1fkle\x03\x00\x0e\xb7\xc3\xa9\xbak\xf1\x06d\xf9\xcc\xd6\n\xeeOk\x84b\xa7(\xfay\xc6\\\xb1Z\x16\x0e&DT+\x9fA\xcd*\x95{\xd6\xfd\xecvN\xcbim%\xb8*\x92\x83\xae\x97\x1f\xf1\"\xd5p\x94\x8b\f^n_r))\xf7w\x17\tx\xf3\xf5\x9c\xa8\x1e=vw') write$selinux_load(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75780f75d847c795ec1d631785320d1e60c147fa51dbe0630bbe7b2e842e836f5a28fc3b39ca5bb9ead133e8ba3e52fc71ca423ce7756786d4a16fb6ed82a2410a6573c691a66851b85484cb964a03d1cb0f2b695850ab"], 0x70) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x7fffd, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a0000000000000000000000000000000000ffffe00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f41cba3413c2a4259f65b2255ea608340f58c936697d6e5c97061cef058e7fcaaf8d369af757a8516d235c38541a769785bda2307061ba106fdd0adb6107b99c35847ed1ef82d7897f5fa33476f0c95870b3f867e8107cdcba3df165e5a782d624709f3481494d13a4a8faeaaaa7a24178e4a731d4a8e986a074ac9f5c87f51db70990248528ff8e4d9100fa8c5c1674eae264e1de6225f3"], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) unshare(0x200000007fc) accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0}, &(0x7f0000000640)=0x14) r4 = getuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000700)={{{@in6=@dev={0xfe, 0x80, [], 0x18}, @in=@multicast1, 0x4e22, 0x5cb, 0x4e24, 0x0, 0x2, 0x20, 0x80, 0x3d, r3, r4}, {0x4, 0x5, 0x100, 0x40, 0xd0, 0x4d9, 0x80, 0x1}, {0x5, 0xeaa2, 0x2, 0x100}, 0x280000000, 0x0, 0x1, 0x0, 0x1, 0x1}, {{@in=@rand_addr=0xffff, 0x4d6, 0xff}, 0xa, @in6=@mcast1, 0x3506, 0x2, 0x2, 0x5, 0x7, 0x2a, 0x98}}, 0xe8) prctl$PR_GET_TIMERSLACK(0x1e) geteuid() r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0xfffffffffffffffe, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r6 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x100000000002, 0x0) ioctl$ION_IOC_ALLOC(r6, 0xc0184900, &(0x7f00000001c0)={0x4, 0x2, 0x1, r7}) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x5) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo\x00') r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r7, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="000326bd7000e8dbdf25010000000000000009410000001c0018fffffffb6574683a76657468305f746f5f68737200000000"], 0x38}, 0x1, 0x0, 0x0, 0x20000800}, 0x800) write(r8, &(0x7f0000000100)="bca2a9cc8d095df5951f4369a7705c327b26b801149d03d8b6cf356d1e51a7d5ae10df86c40e7de0f0d45d883c270e", 0x2f) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) request_key(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0xfffffffffffffffb) [ 427.513601] ================================================================== [ 427.521076] BUG: KASAN: use-after-free in get_disk+0xc0/0xd0 [ 427.526962] Read of size 8 at addr ffff8881a79d9eb0 by task blkid/20648 [ 427.533710] [ 427.535342] CPU: 0 PID: 20648 Comm: blkid Not tainted 4.14.127+ #8 [ 427.541671] Call Trace: [ 427.544268] dump_stack+0xb9/0x10e [ 427.547820] ? get_disk+0xc0/0xd0 [ 427.551278] print_address_description+0x60/0x226 [ 427.556127] ? get_disk+0xc0/0xd0 [ 427.559583] kasan_report.cold+0xae/0x2d5 [ 427.563738] ? get_disk+0xc0/0xd0 [ 427.567192] ? get_gendisk+0xee/0x240 [ 427.571005] ? __blkdev_get+0x345/0xf90 [ 427.575083] ? __blkdev_put+0x6d0/0x6d0 [ 427.579083] ? blkdev_get+0x97/0x8b0 [ 427.582804] ? bd_acquire+0x149/0x2c0 [ 427.586615] ? bd_may_claim+0xd0/0xd0 [ 427.590415] ? lock_downgrade+0x5d0/0x5d0 [ 427.594573] ? lock_acquire+0x10f/0x380 [ 427.598547] ? bd_acquire+0x113/0x2c0 [ 427.602372] ? blkdev_open+0x1cc/0x250 [ 427.606263] ? security_file_open+0x88/0x190 [ 427.610684] ? do_dentry_open+0x44e/0xdf0 [ 427.614840] ? bd_acquire+0x2c0/0x2c0 [ 427.618657] ? vfs_open+0x105/0x230 [ 427.622292] ? path_openat+0xb6b/0x2b70 [ 427.626288] ? path_mountpoint+0x9a0/0x9a0 [ 427.630541] ? trace_hardirqs_on+0x10/0x10 [ 427.634797] ? do_filp_open+0x1a1/0x280 [ 427.638782] ? may_open_dev+0xe0/0xe0 [ 427.642614] ? lock_downgrade+0x5d0/0x5d0 [ 427.646762] ? lock_acquire+0x10f/0x380 [ 427.650738] ? __alloc_fd+0x3f/0x490 [ 427.654553] ? _raw_spin_unlock+0x29/0x40 [ 427.658709] ? __alloc_fd+0x1bf/0x490 [ 427.662536] ? do_sys_open+0x2ca/0x590 [ 427.666433] ? filp_open+0x60/0x60 [ 427.669989] ? do_syscall_64+0x43/0x510 [ 427.674050] ? do_sys_open+0x590/0x590 [ 427.677944] ? do_syscall_64+0x19b/0x510 [ 427.682014] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 427.687391] [ 427.689015] Allocated by task 20613: [ 427.692732] kasan_kmalloc.part.0+0x4f/0xd0 [ 427.697130] kmem_cache_alloc_trace+0x126/0x310 [ 427.701789] alloc_disk_node+0x5b/0x3d0 [ 427.705751] [ 427.707370] Freed by task 20637: [ 427.710731] kasan_slab_free+0xb0/0x190 [ 427.714696] kfree+0xf5/0x310 [ 427.717795] device_release+0xf4/0x1a0 [ 427.721668] [ 427.723287] The buggy address belongs to the object at ffff8881a79d9980 [ 427.723287] which belongs to the cache kmalloc-2048 of size 2048 [ 427.736210] The buggy address is located 1328 bytes inside of [ 427.736210] 2048-byte region [ffff8881a79d9980, ffff8881a79da180) [ 427.748256] The buggy address belongs to the page: [ 427.753275] page:ffffea00069e7600 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 427.763330] flags: 0x4000000000010200(slab|head) [ 427.768088] raw: 4000000000010200 0000000000000000 0000000000000000 00000001000f000f [ 427.776056] raw: ffffea00068abc00 0000000200000002 ffff8881da802800 0000000000000000 [ 427.783934] page dumped because: kasan: bad access detected [ 427.789645] [ 427.791296] Memory state around the buggy address: [ 427.796216] ffff8881a79d9d80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 427.803652] ffff8881a79d9e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 427.811002] >ffff8881a79d9e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 427.818434] ^ [ 427.823351] ffff8881a79d9f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 427.830698] ffff8881a79d9f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 427.838049] ================================================================== [ 427.845489] Disabling lock debugging due to kernel taint [ 427.850989] Kernel panic - not syncing: panic_on_warn set ... [ 427.850989] [ 427.858358] CPU: 0 PID: 20648 Comm: blkid Tainted: G B 4.14.127+ #8 [ 427.865881] Call Trace: [ 427.868467] dump_stack+0xb9/0x10e [ 427.872008] panic+0x1d9/0x3c2 [ 427.875193] ? add_taint.cold+0x16/0x16 [ 427.879159] ? retint_kernel+0x2d/0x2d [ 427.883065] ? get_disk+0xc0/0xd0 [ 427.886523] kasan_end_report+0x43/0x49 [ 427.890591] kasan_report.cold+0xca/0x2d5 [ 427.894827] ? get_disk+0xc0/0xd0 [ 427.898268] ? get_gendisk+0xee/0x240 [ 427.902062] ? __blkdev_get+0x345/0xf90 [ 427.906034] ? __blkdev_put+0x6d0/0x6d0 [ 427.910013] ? blkdev_get+0x97/0x8b0 [ 427.913719] ? bd_acquire+0x149/0x2c0 [ 427.917515] ? bd_may_claim+0xd0/0xd0 [ 427.921349] ? lock_downgrade+0x5d0/0x5d0 [ 427.925485] ? lock_acquire+0x10f/0x380 [ 427.929451] ? bd_acquire+0x113/0x2c0 [ 427.933353] ? blkdev_open+0x1cc/0x250 [ 427.937234] ? security_file_open+0x88/0x190 [ 427.941634] ? do_dentry_open+0x44e/0xdf0 [ 427.945785] ? bd_acquire+0x2c0/0x2c0 [ 427.949686] ? vfs_open+0x105/0x230 [ 427.953396] ? path_openat+0xb6b/0x2b70 [ 427.957726] ? path_mountpoint+0x9a0/0x9a0 [ 427.961960] ? trace_hardirqs_on+0x10/0x10 [ 427.966196] ? do_filp_open+0x1a1/0x280 [ 427.970164] ? may_open_dev+0xe0/0xe0 [ 427.973966] ? lock_downgrade+0x5d0/0x5d0 [ 427.978101] ? lock_acquire+0x10f/0x380 [ 427.982066] ? __alloc_fd+0x3f/0x490 [ 427.985781] ? _raw_spin_unlock+0x29/0x40 [ 427.990006] ? __alloc_fd+0x1bf/0x490 [ 427.993805] ? do_sys_open+0x2ca/0x590 [ 427.997877] ? filp_open+0x60/0x60 [ 428.001419] ? do_syscall_64+0x43/0x510 [ 428.005383] ? do_sys_open+0x590/0x590 [ 428.009270] ? do_syscall_64+0x19b/0x510 [ 428.013326] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 428.019109] Kernel Offset: 0xb600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 428.029934] Rebooting in 86400 seconds..