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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0xd402, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:46 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xce6b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:47 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r32) setsockopt$inet6_tcp_TLS_TX(r32, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r32, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0xe002, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:47 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:47 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) [ 1428.443591][T18643] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0xe084, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:47 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:48 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xcf6b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:48 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r32) setsockopt$inet6_tcp_TLS_TX(r32, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:48 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000e40)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0xea02, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) [ 1429.254475][T19061] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:48 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000e40)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:48 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x0, 0x0, r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) [ 1429.647567][T19188] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:49 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) r32 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r33) setsockopt$inet6_tcp_TLS_TX(r33, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r33, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r32, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r34}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r35 = socket$inet(0x2, 0x1, 0x0) fstat(r35, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r36, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r37 = socket$inet(0x2, 0x1, 0x0) fstat(r37, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r38}], {0x10, 0x2}}, 0x2c, 0x1) r39 = socket$inet(0x2, 0x1, 0x0) fstat(r39, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r40, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r36, r38, 0x0, r40]) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) [ 1430.030226][T19294] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0xfeff, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd06b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:49 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r32) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:50 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x0, 0x0, r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0xff0f, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:50 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x0, 0x0, r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd16b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:50 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r32) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:50 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000e40)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) [ 1431.702840][T19605] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0xff7f, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:51 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:51 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x0, 0x0, r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:51 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) [ 1432.326515][T19746] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0xfffe, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:52 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x0, 0x0, r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd26b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:52 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r32) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) [ 1432.926933][T20058] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x34000, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd36b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:52 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000e40)=ANY=[@ANYBLOB], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:52 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:53 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x21, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) [ 1433.849013][T20220] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:53 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) [ 1434.035680][T20298] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:53 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36911, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:53 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) [ 1434.807628][T20515] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd46b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) [ 1435.213759][T20518] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:54 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36912, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd36b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:54 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x21, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd56b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:55 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36913, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:55 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:55 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x21, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:55 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd66b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36914, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:55 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd76b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:55 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x32, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) [ 1436.658985][T21074] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 1436.833530][T21080] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:56 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x32, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36915, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:56 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:56 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x32, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:56 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r32 = socket$inet(0x2, 0x1, 0x0) fstat(r32, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:56 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, 0x0, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd86b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36916, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) [ 1437.850231][T21609] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 1438.239403][T21618] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:57 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:57 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r32 = socket$inet(0x2, 0x1, 0x0) fstat(r32, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36917, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:58 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3a, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xd96b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:58 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36918, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:22:58 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:22:58 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3a, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xda6b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:59 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r32 = socket$inet(0x2, 0x1, 0x0) fstat(r32, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:22:59 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3a, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x36919, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) [ 1440.178370][T22082] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:22:59 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3e, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:22:59 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:23:00 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:23:00 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:23:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x3691a, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) [ 1441.420243][T22502] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 1441.490430][T22507] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:23:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xdb6b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:23:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x3691b, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:23:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xda6b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:23:01 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf43b4043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff332f3edb89b06953b3ba545513b0f365c62858d343860cd4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f63025600000000fa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63f7f4fd217d929bde6a29c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3708bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bc10f4496c393d3dc2d59e2006f4bb84b5c46b7cc096a606000000196a000015e5346721403012b72ca239010000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14a84d7e7e4702c8ab0ee8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d900"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3e, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:23:01 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) 01:23:01 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:23:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0xdc6b0300, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) 01:23:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x3691c, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:23:01 executing program 2: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) 01:23:01 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3e, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) 01:23:02 executing program 5: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r3, r2, 0xd, 0x2}, 0xd) r4 = openat$cgroup_procs(r3, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r4, &(0x7f0000000580)=r6, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r7}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r6, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r7}, 0x30) r8 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r10 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r10, r9, 0xd, 0x2}, 0xd) r11 = openat$cgroup_procs(r10, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r12 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r12, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r11, &(0x7f0000000580)=r13, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r14}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r13, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r8, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r14}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r6, r8, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r16 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r16, r15, 0xd, 0x2}, 0xd) r17 = openat$cgroup_procs(r16, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r18 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r18, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r17, &(0x7f0000000580)=r19, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r19, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r20}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r21 = socket$inet(0x2, 0x1, 0x0) fstat(r21, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r22}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r23 = socket$netlink(0x10, 0x3, 0x0) r24 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r24, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r24, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r23, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r25}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r26 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r27 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r27, r26, 0xd, 0x2}, 0xd) r28 = openat$cgroup_procs(r27, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r29 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r28, &(0x7f0000000580)=r30, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r31}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r30, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r31}, 0x30) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r32, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) socket$inet(0x2, 0x1, 0x0) r33 = socket$inet(0x2, 0x1, 0x0) fstat(r33, &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) socket$inet(0x2, 0x1, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4}], {0x10, 0x2}}, 0x2c, 0x1) socket$nl_route(0x10, 0x3, 0x0) [ 1442.804439][T22852] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:23:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x3691d, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r2}]]}}}]}, 0x38}}, 0x0) 01:23:02 executing program 4: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r9, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x40, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r17 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r17, r16, 0xd, 0x2}, 0xd) r18 = openat$cgroup_procs(r17, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r19 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r19, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r18, &(0x7f0000000580)=r20, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r21}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r20, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r21}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r22 = socket$inet(0x2, 0x1, 0x0) fstat(r22, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r23}], {0x10, 0x2}}, 0x2c, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r26}]]}}}]}, 0x38}}, 0x0) socket$unix(0x1, 0x5, 0x0) r27 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r28 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r28, r27, 0xd, 0x2}, 0xd) r29 = openat$cgroup_procs(r28, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r30 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r29, &(0x7f0000000580)=r31, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r32}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r31, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r32}, 0x30) r33 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r34) setsockopt$inet6_tcp_TLS_TX(r34, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r34, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r34, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r33, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r35}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r36 = socket$inet(0x2, 0x1, 0x0) fstat(r36, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r37, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r38 = socket$inet(0x2, 0x1, 0x0) fstat(r38, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r39}], {0x10, 0x2}}, 0x2c, 0x1) r40 = socket$inet(0x2, 0x1, 0x0) fstat(r40, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r41, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r37, r39, 0x0, r41]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r43}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r45 = dup(r44) ioctl$PERF_EVENT_IOC_ENABLE(r45, 0x8912, 0x400200) r46 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r46, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r46, 0xae80, 0x0) [ 1443.303180][T23063] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 01:23:02 executing program 1: execve(0x0, &(0x7f0000000200)=[&(0x7f0000000340)='(@\x00'], 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='autogroup\x00') recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r4, r3, 0xd, 0x2}, 0xd) r5 = openat$cgroup_procs(r4, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r5, &(0x7f0000000580)=r7, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r8}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r7, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r8}, 0x30) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r9, 0x4, 0x2000) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/540], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r11, r10, 0xd, 0x2}, 0xd) r12 = openat$cgroup_procs(r11, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r13 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r12, &(0x7f0000000580)=r14, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r15}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r14, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00', r15}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r9, 0x0, 0x2, &(0x7f0000000040)='#\x00', 0xffffffffffffffff}, 0x30) r17 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000300), &(0x7f0000000840)=0x0) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r20 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r20, r19, 0xd, 0x2}, 0xd) r21 = openat$cgroup_procs(r20, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r22 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r21, &(0x7f0000000580)=r23, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r24}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r23, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r24}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) r26 = socket$inet(0x2, 0x1, 0x0) fstat(r26, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r27}], {0x10, 0x2}}, 0x2c, 0x1) r28 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r31}]]}}}]}, 0x38}}, 0x0) r32 = socket$unix(0x1, 0x5, 0x0) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000e7b0dcc3daa5520d15393464e02ff4091800eb0c280a1d56bb729bd3378032a431db705eb5b2e2b951872ba3aec4f8eabee8263265ac087ecd8645ab029395eb39974ae562e72ab946b87fc14b688f5b4c456cb467e285de87dd3c9510a1aadeaf28fb9b710ecf7fdd4240aece1996b95aa33f7a702cf4314043558b94402b9ccfe9622f5aa1809e22cb6a6f516eb5ce41f2f2ff33273edb89b06953b3ba545513b0f358d4553053807f609db7928b73b60c04bb9923de8272017f1dc2e6112fd9f7e967fc260299ba5ea9fb0d3fe1befc431917451d1f630256c08b8afbfa1c09afeac772977a2b01d841e5108d5db00f75866b7b295e96eb336d63ddf4fd217d929bde6a13695ecfa3aa958341f029c2009e91d2d4279af3cd57059a15b68956aa5aaf535a3754bcf9b637185d169b132f200c77a9bb735dd2811ece8f39092950a7e127fc47a78ccda231002246ec19b8a6376e0c1cff2aa8d30c8c7475bca6780028fcc73e0f46b3c4f3d59e2006f4bb84b5c46b7cc096a6570bb963196a00000000000000000000000000000000bbcba8b33e7b553900bbb6d986ad0f8847ab01f800e1997af2dd1621259e80501570504272aa68b13c9958ac628b6b1024aefe54222c4901b6819e14754d7e7e4702c81083e8f3a516319ccf79b555141dd394abe823c3d8f66f52eb5ef2d90035d89cfb4649c368bc032bb371"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1cf}, 0x48) r34 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r34, r33, 0xd, 0x2}, 0xd) r35 = openat$cgroup_procs(r34, &(0x7f00000004c0)='cgroup.threads\x00', 0x2, 0x0) r36 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r36, 0x8904, &(0x7f0000000000)=0x0) write$cgroup_pid(r35, &(0x7f0000000580)=r37, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0x7, 0x8, 0x2}, &(0x7f0000000500)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={r37, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='vmnet0!keyring/:\x00', r38}, 0x30) r39 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r40) setsockopt$inet6_tcp_TLS_TX(r40, 0x11a, 0x1, &(0x7f0000000a40)=@gcm_128={{0x303}, "658bdce8f16b6901", "9fae1947fe62576d6d7573c55f795e68", "a43cc80d", "ca90bc29c8f91cf6"}, 0x28) sendmsg$inet(r40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@ip_tos_u8={{0x11, 0x11a}}], 0x18}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r40, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r39, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)=[{&(0x7f0000000640)={0x70, 0x0, 0x7c7933bb7231ad5f, 0x0, 0x25dfdbfc, "", [@typed={0x8, 0x8001, @str='bbr\x00'}, @generic="360304a9e98f87cca47f33213f0c73d1b006848d6c79a8058deb979476c8596b4b1fbcce7f6ae8283f8034ef3284ff6b655a5a094f0f87faffcfdc52beaf5c1303bf7758a5b0c34efb1d7505ae6b264b7814319180"]}, 0x70}, {&(0x7f0000001340)={0x510, 0x11, 0x100, 0x70bd2a, 0x25dfdbfe, "", [@nested={0x140, 0x8f, [@typed={0x4, 0x50}, @generic, @typed={0xc, 0xd, @u64=0xa09}, @generic="57e26cdb782be5e426d15b10e0b824f4fec2a9df3dce3dbe08c1dfce3903a584e0c75572652c2e9442a4bc85d332c307e79cba553bab5f3500554d7cd98c7a50c6d5eb54a1a5c1d5854a611bd931c8889099a7410c3117d269d96a1aa34ee173dac0f83ecdfd2b971a76", @generic="f04be7a382834899954e25f913c9d678b5f10576d59cb436fc3013b3d7994f27837c6b781076eaabd27b4d321dc85f834d83c950c5adf77a8743a2b9da51cbd7dcae7cfa941939aa08f7c9fba87b7177c8a19a231e950ae385563b4ba23054f6267309bf7795ddc939e12e908a1296b7b3bd56b3f3d90e45e497223be6c64df96d12f49e98d54212cfff399fd55d1f105027dade4403bccf7c35b98e033ab75a3546c976da940ee904f3fdae", @typed={0x8, 0x0, @uid=r41}, @typed={0xc, 0x31, @u64=0x101}]}, @typed={0x10, 0x83, @str='vboxnet1\x00'}, @nested={0x3b0, 0x6c, [@typed={0x8, 0x26, @ipv4=@broadcast}, @generic="1d0aa14ed9bd9d358ec5545e22e83cc3dde3c639ba6490f084a795c5e1dcd7e02daa2741106ecb2a235fffb96ecc934e3f1c7370b28d8f2fcb0b7063e4dbff2173da8577e78070e2f43150d7ae38357c4a310b972c9fe2c998dfef486f6a3567303fb0fafa744c0cdd3a97a21d0ede12244d6fc9af9be6c31661e359995360b8541f1c9213d7a4fca816f23aca6dc6f93705502b190c3e4f8c7d53c4862493bc3b87def50a858d5a4739b88c760a8b92183266b151162127e523cfe5ec04b95a7d4227826c4482d46448e03446f806aa3d66", @typed={0x8, 0x0, @u32=0x100}, @generic, @generic="436ffaf098e0cb176f02b4647480d90635c4608f5fd315b1a4ba8239e3a15447af80a500269594bf6f4d76ce0dbbc874698a82833adba365624f6076c2abf57b780098783decff596a3e647fbd0a0367e83139b4c9ff0c91648f90176d534b55740a47f63243dd22b5b503ff92ccda2bcc71e440b3041a8df54c57cba2aa97eb1beda6cdd2dd9e161ab7f73a12e7206763e7a65e529f516cccfd59c605834c1aa78fe3abd81f914aca1392308ef4766c004a02dc833fd71c77315983a98989378671539f22eea8557c75d037499d8ec3b534bfd113b77047a85358", @generic="c74a39be89e54dff0950048aa9b1c958203899605d2f035296d3fd1f38f3714cbcc481af3f10220de1e603514e4a17562dedf95074fe54e145bbc94a9d39a14b5f2fef52b76ae1bdc9265558171fcc84d68ee7a3ebe5b35cf7a2df9544cb7c88329e6577aff6443b9efbddf7a83229080edabc92949077982c266cfebd9635e35e92b92114b2fe19fdd45feb6c7b7830448659e5901ac93de3d76738b6a8639a666999f0bd3b797b4b7ee9d32779274117", @generic="f21563092e92320405906d177300c63b6679348cec2076d95b057528fa9e2a4980c90d1d2ac2659b87237824b2c43f894f39dfa5a4951dd5b43cbb44d696515fa5fb2a5e1f471a60e15b0c5bbc3b35edf4d05f32f1b4b795bb662acf5b7941c2cba20954adcbc5f542865fd9aecd8441cf185a3086ccd9aeeed1f9ddbdca20501c955cffd15d7190889b569e21e7127da4ef5104873b47e209dee533c4fe11743d0d6d8543ea94575ae326796037629ac402cda1c6f88fd163ccc9e8e593f9e50fc43d9658cd16531257a2054c7dd4ac2b745b8f072fdad0723e6f3b1922f24980e7", @typed={0x4, 0x91}, @generic="0c25af88ac314d35467170d703f1eb1c2a99dfdede9ade6096d36ea3ba18833d1fdf15bd746df6b2c20f94d4ffa5397b056586c5f17cb08d46ae51ca9c04e5207bc3a630d3e0c5642e53fea3f124a8803c53546d9af0ece9"]}]}, 0x510}], 0x2, 0x0, 0x0, 0x40000}, 0x0) r42 = socket$inet(0x2, 0x1, 0x0) fstat(r42, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000c80)=ANY=[@ANYBLOB="020d9e6fe0528c460000000100000000000000042af2c10002000000000408004800", @ANYRES32=r43, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) r44 = socket$inet(0x2, 0x1, 0x0) fstat(r44, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r45}], {0x10, 0x2}}, 0x2c, 0x1) r46 = socket$inet(0x2, 0x1, 0x0) fstat(r46, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="020000000100000000000000040002d8d1e7e72885169fc9", @ANYRES32=r47, @ANYBLOB="10000200000000002000000000000000"], 0x2c, 0x1) getgroups(0x4, &(0x7f00000009c0)=[r43, r45, 0x0, r47]) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r50 = socket$inet(0x2, 0x1, 0x0) fstat(r50, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r51}], {0x10, 0x2}}, 0x2c, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r53 = dup(r52) ioctl$PERF_EVENT_IOC_ENABLE(r53, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r53, 0xc0502100, &(0x7f0000000b40)={0x0, 0x0}) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r56 = socket$inet(0x2, 0x1, 0x0) fstat(r56, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f00000003c0)={{}, {}, [], {0x4, 0x2}, [{0x8, 0x4, r57}], {0x10, 0x2}}, 0x2c, 0x1) r58 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r58, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r58, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r59 = socket$nl_route(0x10, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000000e80)=[{&(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000440)="0812a508ea834031d943b605bb755c9e165ca610180d4f448860607e77a5218b1f195f7baba81bba8c66d4e99e48e0b14accd46974b4e251e8c48ec5e2ebfe4450ba6c58291411ff524dc253e10d65be413b8ffb1840cc5b755fc96ffd3d4505e5001892841ee308d85b36b25a3dee5cfcbf2967cbfdecb6c57443b98fae146ebe2158d49d08086ed3e26e36699da11dbae813cdbc24c8b478c0c55114301a920a81dc04eab2b06b32247a2eba1af4ed1b4a", 0xb2}, {&(0x7f0000000500)="6b1b0b60ac40cfae6649d46e98280834f296b5f94e1982139e3215ada32cddaac974565f645b22b8253bbe81dd25a73b2f2ec1c1a6106d0c93e866b72f33cdf13b466339e6fe451dcb70c4d6046d1dbe97fdba96a48159e4efd4cf2ce1774c2526523be757bf92d3fb3d0605e5", 0x6d}, {&(0x7f0000000580)="f48049ad9d35913a5a8a82744adc8701a5226fa4538b65fc3fb858dc2c497e7a7eb39941cc4d85cc69c2f5013b1dd05877a003c8b2f0ba26c59688f45f0ee4fc6854d6c212867355fb595a563a639412d988b7b3", 0x54}, {&(0x7f0000000600)="6d1c3e481342f5bf27fed9ea63490f39df9383cf5f0bbef7928a7c0151f3b37a88f10aca6d35cdf52dee21f18a30d41973ca9d2c759eb095cd7a561fdfe658993af05ec67fe3ba98a163cdd8d222a73e0e900005c3f31e75cd4e770b83d1ac48720c076efa50e535491ad7f53d0eef0b70c2deb37bb720498dfa8efb056b020297244de17f0e3cc80150a99d63cfa1b0e9d8e6425239b5365f79b753aa049941c4f36b4cacce05725407f287b65eb221e2eb751f826682b8bac76503982bd4686595598d5887f67b232998b64ec78584697039279f1789cf30cce45a78170b60701c1ccb07a643085399a97a477fb7ab308364ace59a6f27", 0xf8}, {&(0x7f0000000700)="dc362290fe1977867973b5b60f3d2d94151e88c1c9404ece8915e7ac6974094fc2aef20ff125ded7d489cb63e80ba38acf4f14479487edb04b05fc31e535fa499750549fd257b9d0822d8e3135b4b1822f7a1598b2d7294c5b85a84b86958e1a934c16db37ed22febf271cc8bc7ed5bd4beef20815e6142ac2570d1da25a11ce4fb5035f033c8b54e83557bc0bfb3d66c1207f9abd1c8b12682c0456a9331d5c094aa39e501632ac54da7b42e9", 0xad}], 0x5, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @cred={{0x1c, 0x1, 0x2, {r23, r25, r27}}}, @rights={{0x24, 0x1, 0x1, [r28, r29, r32, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r37, r41, r48}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r49, r51}}}, @cred={{0x1c, 0x1, 0x2, {r54, r55, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8, 0x20000000}], 0x1, 0x0) r60 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/icmp6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r60, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000400)="0faf9802000000460f01d10f08f346fd66b85300400f35bc66cdb80b000b00d86666660f38824347400f73d0264381d449000000400fc72f", 0x38}], 0x1, 0x0, &(0x7f0000000140)=[@cr4={0x1, 0x40000}], 0x1) ioctl$KVM_RUN(r60, 0xae80, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x59}, 0x1c) [ 1443.470281][T22841] ================================================================== [ 1443.478415][T22841] BUG: KCSAN: data-race in fasync_remove_entry / kill_fasync [ 1443.485771][T22841] [ 1443.488096][T22841] read to 0xffff888074bebef8 of 8 bytes by interrupt on cpu 0: [ 1443.495640][T22841] kill_fasync+0x3f/0x180 [ 1443.499974][T22841] perf_event_wakeup+0x11f/0x160 [ 1443.504912][T22841] perf_pending_event+0x12d/0x170 [ 1443.509940][T22841] irq_work_run_list+0xea/0x140 [ 1443.514787][T22841] irq_work_run+0x48/0xa0 [ 1443.519117][T22841] smp_irq_work_interrupt+0x3f/0x100 [ 1443.524405][T22841] irq_work_interrupt+0xf/0x20 [ 1443.529181][T22841] __sanitizer_cov_trace_pc+0x0/0x50 [ 1443.534477][T22841] snprintf+0x6f/0xa0 [ 1443.538463][T22841] dev_alloc_name_ns+0x1bf/0x360 [ 1443.543409][T22841] dev_get_valid_name+0x75/0xe0 [ 1443.548265][T22841] register_netdevice+0xfa/0xa50 [ 1443.553206][T22841] ipip6_tunnel_create+0x176/0x200 [ 1443.558323][T22841] ipip6_newlink+0xde/0x210 [ 1443.562824][T22841] __rtnl_newlink+0xc89/0x1010 [ 1443.567597][T22841] rtnl_newlink+0x63/0x90 [ 1443.571918][T22841] rtnetlink_rcv_msg+0x1d3/0x500 [ 1443.576845][T22841] netlink_rcv_skb+0xb0/0x260 [ 1443.581600][T22841] rtnetlink_rcv+0x26/0x30 [ 1443.586008][T22841] netlink_unicast+0x354/0x430 [ 1443.590762][T22841] netlink_sendmsg+0x456/0x770 [ 1443.595514][T22841] sock_sendmsg+0x9f/0xc0 [ 1443.599832][T22841] ___sys_sendmsg+0x59d/0x5d0 [ 1443.604503][T22841] __sys_sendmsg+0xa0/0x160 [ 1443.608995][T22841] __x64_sys_sendmsg+0x51/0x70 [ 1443.613752][T22841] do_syscall_64+0xcc/0x370 [ 1443.618249][T22841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1443.624116][T22841] [ 1443.626434][T22841] write to 0xffff888074bebef8 of 8 bytes by task 22841 on cpu 1: [ 1443.634138][T22841] fasync_remove_entry+0xba/0x120 [ 1443.639148][T22841] fasync_helper+0xcf/0xdc [ 1443.643552][T22841] perf_fasync+0x6c/0xa0 [ 1443.647780][T22841] __fput+0x46a/0x520 [ 1443.651749][T22841] ____fput+0x1f/0x30 [ 1443.655723][T22841] task_work_run+0xf6/0x130 [ 1443.660217][T22841] exit_to_usermode_loop+0x2b4/0x2c0 [ 1443.665497][T22841] do_syscall_64+0x353/0x370 [ 1443.670076][T22841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1443.675945][T22841] [ 1443.678259][T22841] Reported by Kernel Concurrency Sanitizer on: [ 1443.684402][T22841] CPU: 1 PID: 22841 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 1443.692282][T22841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.702327][T22841] ================================================================== [ 1443.710373][T22841] Kernel panic - not syncing: panic_on_warn set ... [ 1443.716950][T22841] CPU: 1 PID: 22841 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 1443.724819][T22841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.734866][T22841] Call Trace: [ 1443.738167][T22841] dump_stack+0x11d/0x181 [ 1443.742493][T22841] panic+0x210/0x640 [ 1443.746383][T22841] ? vprintk_func+0x8d/0x140 [ 1443.750994][T22841] kcsan_report.cold+0xc/0xd [ 1443.755589][T22841] kcsan_setup_watchpoint+0x3fe/0x460 [ 1443.760963][T22841] __tsan_unaligned_write8+0xc4/0x100 [ 1443.766321][T22841] fasync_remove_entry+0xba/0x120 [ 1443.771349][T22841] fasync_helper+0xcf/0xdc [ 1443.775760][T22841] perf_fasync+0x6c/0xa0 [ 1443.780000][T22841] __fput+0x46a/0x520 [ 1443.783973][T22841] ? __perf_event_init_context+0x1b0/0x1b0 [ 1443.789780][T22841] ____fput+0x1f/0x30 [ 1443.793755][T22841] task_work_run+0xf6/0x130 [ 1443.798263][T22841] exit_to_usermode_loop+0x2b4/0x2c0 [ 1443.803553][T22841] do_syscall_64+0x353/0x370 [ 1443.808142][T22841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1443.814020][T22841] RIP: 0033:0x4141d1 [ 1443.817912][T22841] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1443.837514][T22841] RSP: 002b:00007fff44c8c1b0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1443.845913][T22841] RAX: 0000000000000000 RBX: 0000000000000009 RCX: 00000000004141d1 [ 1443.853874][T22841] RDX: 0000000000000000 RSI: ffffffff8497e0e4 RDI: 0000000000000008 [ 1443.861834][T22841] RBP: 0000000000000001 R08: ffffffff816da3cf R09: 000000009779210f [ 1443.869792][T22841] R10: 00007fff44c8c290 R11: 0000000000000293 R12: 000000000075c9a0 [ 1443.877752][T22841] R13: 000000000075c9a0 R14: 000000000076b4c8 R15: 000000000075c07c [ 1443.885734][T22841] ? full_name_hash+0x7f/0x110 [ 1443.890492][T22841] ? snprintf+0x44/0xa0 [ 1443.896027][T22841] Kernel Offset: disabled [ 1443.900359][T22841] Rebooting in 86400 seconds..