0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00'}) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000007c0)) [ 840.405801] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 03:37:50 executing program 2: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) r0 = getpid() geteuid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bond0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, r2, 0x0, 0x6, &(0x7f0000000400)='bond0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) 03:37:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) accept4$packet(0xffffffffffffff9c, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000880)=""/4096, &(0x7f0000000040)=0x1000) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mknod$loop(&(0x7f00000003c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/133) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001880)=ANY=[], &(0x7f0000000140)) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000600)=""/204) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000500)=0x14) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000540)={0xb}, 0xd0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000680)=ANY=[], 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000002c0)=""/153) set_tid_address(&(0x7f0000000180)) accept$inet6(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000780)=0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000380), 0x4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000004c0)='/dev/dsp#\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)) getpgrp(0x0) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000002f00)=0xe8) getgid() getpid() stat(&(0x7f0000002f40)='./file0/file0\x00', &(0x7f0000002f80)) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003000)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000003100)=0xe8) 03:37:50 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000170a075f1dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000c6475eaac8e923dca2121a00000990c3efeaf3ee5a80d29fb356da5a", 0x4c}], 0x1}, 0x0) 03:37:50 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/mixer\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00'}) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f00000007c0)) [ 840.654830] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 03:37:51 executing program 1: prctl$intptr(0x17, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000780)="428055a0876969ef69dc00d990c841ff0f26660f3a0eb79d580000051137c4c19086d9f28fc9410feefa4e2179fb5e4b9d9d4175455d0f2e1a1a010d64ac1e5d31a3b786e298660f5a0a7f") 03:37:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000170a075f1dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000c6475eaac8e923dca2121a00000990c3efeaf3ee5a80d29fb356da5a", 0x4c}], 0x1}, 0x0) [ 840.854807] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 03:37:51 executing program 4: getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000480)=0xc) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000004c0)=""/192) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[]}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@rand_addr, @local}, &(0x7f00000006c0)=0xc) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)) memfd_create(&(0x7f0000000280)='!\x00', 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000440)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)={@dev, @local}, &(0x7f0000000640)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000900)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:37:51 executing program 3: listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000001280), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clock_getres(0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000015c0)=0xe8) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) getegid() getpid() ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'veth1_to_bridge\x00', @ifru_flags}) fstat(0xffffffffffffffff, &(0x7f0000001940)) set_robust_list(&(0x7f0000001400)={&(0x7f0000001340)={&(0x7f0000001300)}, 0x0, &(0x7f00000013c0)={&(0x7f0000001380)}}, 0x18) getgroups(0x0, &(0x7f00000019c0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001a40)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:37:51 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000170a075f1dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000c6475eaac8e923dca2121a00000990c3efeaf3ee5a80d29fb356da5a", 0x4c}], 0x1}, 0x0) 03:37:51 executing program 1: prctl$intptr(0x17, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000780)="428055a0876969ef69dc00d990c841ff0f26660f3a0eb79d580000051137c4c19086d9f28fc9410feefa4e2179fb5e4b9d9d4175455d0f2e1a1a010d64ac1e5d31a3b786e298660f5a0a7f") [ 841.203489] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 03:37:51 executing program 5: prctl$intptr(0x17, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000780)="428055a0876969ef69dc00d990c841ff0f26660f3a0eb79d580000051137c4c19086d9f28fc9410feefa4e2179fb5e4b9d9d4175455d0f2e1a1a010d64ac1e5d31a3b786e298660f5a0a7f") 03:37:51 executing program 1: prctl$intptr(0x17, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000780)="428055a0876969ef69dc00d990c841ff0f26660f3a0eb79d580000051137c4c19086d9f28fc9410feefa4e2179fb5e4b9d9d4175455d0f2e1a1a010d64ac1e5d31a3b786e298660f5a0a7f") 03:37:51 executing program 2: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) r0 = getpid() geteuid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bond0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, r2, 0x0, 0x6, &(0x7f0000000400)='bond0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) 03:37:51 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) 03:37:51 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) 03:37:51 executing program 5: prctl$intptr(0x17, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000780)="428055a0876969ef69dc00d990c841ff0f26660f3a0eb79d580000051137c4c19086d9f28fc9410feefa4e2179fb5e4b9d9d4175455d0f2e1a1a010d64ac1e5d31a3b786e298660f5a0a7f") 03:37:51 executing program 1: prctl$intptr(0x17, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000780)="428055a0876969ef69dc00d990c841ff0f26660f3a0eb79d580000051137c4c19086d9f28fc9410feefa4e2179fb5e4b9d9d4175455d0f2e1a1a010d64ac1e5d31a3b786e298660f5a0a7f") 03:37:51 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) 03:37:52 executing program 4: getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000480)=0xc) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000004c0)=""/192) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[]}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@rand_addr, @local}, &(0x7f00000006c0)=0xc) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)) memfd_create(&(0x7f0000000280)='!\x00', 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000440)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)={@dev, @local}, &(0x7f0000000640)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000900)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:37:52 executing program 3: listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000001280), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clock_getres(0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000015c0)=0xe8) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) getegid() getpid() ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'veth1_to_bridge\x00', @ifru_flags}) fstat(0xffffffffffffffff, &(0x7f0000001940)) set_robust_list(&(0x7f0000001400)={&(0x7f0000001340)={&(0x7f0000001300)}, 0x0, &(0x7f00000013c0)={&(0x7f0000001380)}}, 0x18) getgroups(0x0, &(0x7f00000019c0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001a40)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:37:52 executing program 2: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) r0 = getpid() geteuid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bond0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, r2, 0x0, 0x6, &(0x7f0000000400)='bond0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) 03:37:52 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) 03:37:52 executing program 5: prctl$intptr(0x17, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000040), 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000780)="428055a0876969ef69dc00d990c841ff0f26660f3a0eb79d580000051137c4c19086d9f28fc9410feefa4e2179fb5e4b9d9d4175455d0f2e1a1a010d64ac1e5d31a3b786e298660f5a0a7f") 03:37:52 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) 03:37:52 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) 03:37:52 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) r0 = getpid() geteuid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bond0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, r2, 0x0, 0x6, &(0x7f0000000400)='bond0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) 03:37:52 executing program 2: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) r0 = getpid() geteuid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bond0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, r2, 0x0, 0x6, &(0x7f0000000400)='bond0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) 03:37:52 executing program 1: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) 03:37:52 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/217, 0xd9}], 0x1, &(0x7f0000001980)=[{&(0x7f0000001680)=""/167, 0xa7}, {&(0x7f0000001740)=""/140, 0x8c}, {&(0x7f0000001800)=""/136, 0x88}, {&(0x7f00000018c0)=""/13, 0xd}], 0x4, 0x0) 03:37:52 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000a40)}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)={0x0, @broadcast, @rand_addr}, &(0x7f0000001a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a40)={@dev, @multicast2}, &(0x7f0000001a80)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001cc0)={'gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d00)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001e40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001ec0)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001f00)=@xdp, &(0x7f0000001f80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004000)={0x0, @rand_addr, @dev}, &(0x7f0000004040)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000040c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000004200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004240)={{{@in=@local, @in6=@dev}}, {{@in6=@loopback}}}, &(0x7f0000004340)=0xe8) clock_gettime(0x0, &(0x7f00000066c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000065c0), 0x0, 0x0, &(0x7f0000006700)) accept4$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006780)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000067c0), &(0x7f0000006800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006840)={@local, @remote}, &(0x7f0000006880)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006fc0)={&(0x7f0000000140), 0xc, &(0x7f0000006f80)={&(0x7f00000068c0)={0x14}, 0x14}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x0) ioprio_set$pid(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)="2583c22c986880244a5ea3dbf7222feaca4c9462487c7183b3d01c91367d750a75bc313180a4bd14bfcdf7e438794aef92a26c78ae87f30bf29a684dfa70114d7f6b0ba49b6b46c15893be5f0039b1b24be6a6b4fc3bf0d319c7a5814c66b814632abd5235ccce47b7b915217a141b969be604e1d49253d50053a27b85") sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") 03:37:53 executing program 4: getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000480)=0xc) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000004c0)=""/192) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[]}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@rand_addr, @local}, &(0x7f00000006c0)=0xc) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)) memfd_create(&(0x7f0000000280)='!\x00', 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000440)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)={@dev, @local}, &(0x7f0000000640)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000900)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:37:53 executing program 3: listxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) semget$private(0x0, 0x0, 0x0) semtimedop(0x0, &(0x7f0000001280), 0x0, &(0x7f0000000200)={0x0, 0x989680}) clock_gettime(0x0, &(0x7f0000003380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003240), 0x0, 0x0, &(0x7f00000033c0)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000003480)=ANY=[], &(0x7f00000044c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clock_getres(0x0, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f00000015c0)=0xe8) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) getegid() getpid() ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={'veth1_to_bridge\x00', @ifru_flags}) fstat(0xffffffffffffffff, &(0x7f0000001940)) set_robust_list(&(0x7f0000001400)={&(0x7f0000001340)={&(0x7f0000001300)}, 0x0, &(0x7f00000013c0)={&(0x7f0000001380)}}, 0x18) getgroups(0x0, &(0x7f00000019c0)) getpgrp(0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000012c0), &(0x7f0000001a40)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:37:53 executing program 5: pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:37:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xf0, 0x170, 0x1a8, [@ip={'ip\x00', 0x20, {{@loopback, @dev, 0x0, 0x0, 0x0, 0x84, 0x20, 0x0, 0x0, 0x0, 0x3}}}, @realm={'realm\x00', 0x10}]}, [@arpreply={'arpreply\x00', 0x10, {{@local}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x2b0) 03:37:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xf0, 0x170, 0x1a8, [@ip={'ip\x00', 0x20, {{@loopback, @dev, 0x0, 0x0, 0x0, 0x84, 0x20, 0x0, 0x0, 0x0, 0x3}}}, @realm={'realm\x00', 0x10}]}, [@arpreply={'arpreply\x00', 0x10, {{@local}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x2b0) 03:37:53 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) r0 = getpid() geteuid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bond0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, r2, 0x0, 0x6, &(0x7f0000000400)='bond0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) 03:37:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xf0, 0x170, 0x1a8, [@ip={'ip\x00', 0x20, {{@loopback, @dev, 0x0, 0x0, 0x0, 0x84, 0x20, 0x0, 0x0, 0x0, 0x3}}}, @realm={'realm\x00', 0x10}]}, [@arpreply={'arpreply\x00', 0x10, {{@local}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x2b0) 03:37:53 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003580), 0x0, 0x0, &(0x7f0000000080)) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000200)) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) r0 = getpid() geteuid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00'}, 0x10) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bond0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) pivot_root(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, r2, 0x0, 0x6, &(0x7f0000000400)='bond0\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc7397c2a0f0fcdae300f38211a40a5c441657538c48391683f000f01efe5e57d0fecec1a1a01460f01ee45dfde9f") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) 03:37:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={"6e6174000000000000000300", 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xf0, 0x170, 0x1a8, [@ip={'ip\x00', 0x20, {{@loopback, @dev, 0x0, 0x0, 0x0, 0x84, 0x20, 0x0, 0x0, 0x0, 0x3}}}, @realm={'realm\x00', 0x10}]}, [@arpreply={'arpreply\x00', 0x10, {{@local}}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}]}, @snat={'snat\x00', 0x10, {{@dev}}}}]}]}, 0x2b0) 03:37:53 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000a40)}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)={0x0, @broadcast, @rand_addr}, &(0x7f0000001a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a40)={@dev, @multicast2}, &(0x7f0000001a80)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001cc0)={'gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d00)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001e40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001ec0)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001f00)=@xdp, &(0x7f0000001f80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004000)={0x0, @rand_addr, @dev}, &(0x7f0000004040)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000040c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000004200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004240)={{{@in=@local, @in6=@dev}}, {{@in6=@loopback}}}, &(0x7f0000004340)=0xe8) clock_gettime(0x0, &(0x7f00000066c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000065c0), 0x0, 0x0, &(0x7f0000006700)) accept4$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006780)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000067c0), &(0x7f0000006800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006840)={@local, @remote}, &(0x7f0000006880)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006fc0)={&(0x7f0000000140), 0xc, &(0x7f0000006f80)={&(0x7f00000068c0)={0x14}, 0x14}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x0) ioprio_set$pid(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)="2583c22c986880244a5ea3dbf7222feaca4c9462487c7183b3d01c91367d750a75bc313180a4bd14bfcdf7e438794aef92a26c78ae87f30bf29a684dfa70114d7f6b0ba49b6b46c15893be5f0039b1b24be6a6b4fc3bf0d319c7a5814c66b814632abd5235ccce47b7b915217a141b969be604e1d49253d50053a27b85") sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") 03:37:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") mq_open(&(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000600)) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=""/80, 0x50, 0xffffffffffffffff}}, 0x10) mq_open(&(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0, &(0x7f0000000480)) set_thread_area(&(0x7f0000000080)) 03:37:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:53 executing program 4: getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000480)=0xc) getpgid(0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000004c0)=""/192) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000080)=ANY=[]}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@rand_addr, @local}, &(0x7f00000006c0)=0xc) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000180)) memfd_create(&(0x7f0000000280)='!\x00', 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000440)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)={@dev, @local}, &(0x7f0000000640)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000900)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940), &(0x7f0000000980)=0x14) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:37:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 5: pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:37:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000a40)}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)={0x0, @broadcast, @rand_addr}, &(0x7f0000001a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a40)={@dev, @multicast2}, &(0x7f0000001a80)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001cc0)={'gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d00)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001e40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001ec0)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001f00)=@xdp, &(0x7f0000001f80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004000)={0x0, @rand_addr, @dev}, &(0x7f0000004040)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000040c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000004200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004240)={{{@in=@local, @in6=@dev}}, {{@in6=@loopback}}}, &(0x7f0000004340)=0xe8) clock_gettime(0x0, &(0x7f00000066c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000065c0), 0x0, 0x0, &(0x7f0000006700)) accept4$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006780)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000067c0), &(0x7f0000006800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006840)={@local, @remote}, &(0x7f0000006880)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006fc0)={&(0x7f0000000140), 0xc, &(0x7f0000006f80)={&(0x7f00000068c0)={0x14}, 0x14}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x0) ioprio_set$pid(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)="2583c22c986880244a5ea3dbf7222feaca4c9462487c7183b3d01c91367d750a75bc313180a4bd14bfcdf7e438794aef92a26c78ae87f30bf29a684dfa70114d7f6b0ba49b6b46c15893be5f0039b1b24be6a6b4fc3bf0d319c7a5814c66b814632abd5235ccce47b7b915217a141b969be604e1d49253d50053a27b85") sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") 03:37:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") mq_open(&(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000600)) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=""/80, 0x50, 0xffffffffffffffff}}, 0x10) mq_open(&(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0, &(0x7f0000000480)) set_thread_area(&(0x7f0000000080)) 03:37:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 5: pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:37:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:55 executing program 3: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) fsetxattr(r0, &(0x7f0000000180)=@known='security.ima\x00', &(0x7f0000000380)="002fb4e5878d1bbd7a33882e0147df80e95b1e3b80c03149893834fd8a776a0fcb31037ec38d83a720b085a51275653f57770dd38336c7b5c6e9087388f5b68b363032ecb8166958f83e2d0979", 0x4d, 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='security.ima\x00', &(0x7f0000000140)=""/5, 0x5) 03:37:55 executing program 0: clock_gettime(0xf7fffffffffffffd, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='keyring\x00', 0xffffffffffffffff}, 0xfffffe98) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xfffffffffffffdee) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getpgid(0xffffffffffffffff) getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:37:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r1, &(0x7f0000002000)=@ethernet, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000006000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r1, &(0x7f0000000200)={&(0x7f0000004000)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "a702ca9c1a8d1dc1e4e29ed4d2927b5e8155ac02a25334d332f97653d9d90256b4da4ec6f2b44831a3b878ada2f3e5883f2f7c806fb61c1993cc4f19a22c61e4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000011000)={&(0x7f0000010ff0)={0x1d, r2}, 0x10, &(0x7f000000eff0)={&(0x7f0000012f80)={0x1, 0xfffffffffffffffc, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "68759a67d8602d3e4b207446a705148d03f1f86e60b22a6ec7e5b35afc19cd0ed506fb9cdba948697c01f3ec6bc0f8f98290b0198d30bde485753f80c203fe81"}}, 0x80}}, 0x0) 03:37:55 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in=@rand_addr, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000a40)}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)={0x0, @broadcast, @rand_addr}, &(0x7f0000001a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a40)={@dev, @multicast2}, &(0x7f0000001a80)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001bc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001cc0)={'gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d00)={'vcan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d40)={{{@in=@rand_addr, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000001e40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001ec0)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000001f00)=@xdp, &(0x7f0000001f80)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004000)={0x0, @rand_addr, @dev}, &(0x7f0000004040)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000040c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000004200)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004240)={{{@in=@local, @in6=@dev}}, {{@in6=@loopback}}}, &(0x7f0000004340)=0xe8) clock_gettime(0x0, &(0x7f00000066c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000065c0), 0x0, 0x0, &(0x7f0000006700)) accept4$packet(0xffffffffffffffff, &(0x7f0000006740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006780)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000067c0), &(0x7f0000006800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006840)={@local, @remote}, &(0x7f0000006880)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006fc0)={&(0x7f0000000140), 0xc, &(0x7f0000006f80)={&(0x7f00000068c0)={0x14}, 0x14}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x0) ioprio_set$pid(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000400)="2583c22c986880244a5ea3dbf7222feaca4c9462487c7183b3d01c91367d750a75bc313180a4bd14bfcdf7e438794aef92a26c78ae87f30bf29a684dfa70114d7f6b0ba49b6b46c15893be5f0039b1b24be6a6b4fc3bf0d319c7a5814c66b814632abd5235ccce47b7b915217a141b969be604e1d49253d50053a27b85") sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) finit_module(0xffffffffffffffff, &(0x7f0000001fc0)='team\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") 03:37:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") mq_open(&(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000600)) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=""/80, 0x50, 0xffffffffffffffff}}, 0x10) mq_open(&(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0, &(0x7f0000000480)) set_thread_area(&(0x7f0000000080)) 03:37:55 executing program 3: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) fsetxattr(r0, &(0x7f0000000180)=@known='security.ima\x00', &(0x7f0000000380)="002fb4e5878d1bbd7a33882e0147df80e95b1e3b80c03149893834fd8a776a0fcb31037ec38d83a720b085a51275653f57770dd38336c7b5c6e9087388f5b68b363032ecb8166958f83e2d0979", 0x4d, 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='security.ima\x00', &(0x7f0000000140)=""/5, 0x5) 03:37:55 executing program 4: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) fsetxattr(r0, &(0x7f0000000180)=@known='security.ima\x00', &(0x7f0000000380)="002fb4e5878d1bbd7a33882e0147df80e95b1e3b80c03149893834fd8a776a0fcb31037ec38d83a720b085a51275653f57770dd38336c7b5c6e9087388f5b68b363032ecb8166958f83e2d0979", 0x4d, 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='security.ima\x00', &(0x7f0000000140)=""/5, 0x5) 03:37:55 executing program 5: pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:37:55 executing program 3: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) fsetxattr(r0, &(0x7f0000000180)=@known='security.ima\x00', &(0x7f0000000380)="002fb4e5878d1bbd7a33882e0147df80e95b1e3b80c03149893834fd8a776a0fcb31037ec38d83a720b085a51275653f57770dd38336c7b5c6e9087388f5b68b363032ecb8166958f83e2d0979", 0x4d, 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='security.ima\x00', &(0x7f0000000140)=""/5, 0x5) 03:37:55 executing program 4: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) fsetxattr(r0, &(0x7f0000000180)=@known='security.ima\x00', &(0x7f0000000380)="002fb4e5878d1bbd7a33882e0147df80e95b1e3b80c03149893834fd8a776a0fcb31037ec38d83a720b085a51275653f57770dd38336c7b5c6e9087388f5b68b363032ecb8166958f83e2d0979", 0x4d, 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='security.ima\x00', &(0x7f0000000140)=""/5, 0x5) 03:37:55 executing program 4: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) fsetxattr(r0, &(0x7f0000000180)=@known='security.ima\x00', &(0x7f0000000380)="002fb4e5878d1bbd7a33882e0147df80e95b1e3b80c03149893834fd8a776a0fcb31037ec38d83a720b085a51275653f57770dd38336c7b5c6e9087388f5b68b363032ecb8166958f83e2d0979", 0x4d, 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='security.ima\x00', &(0x7f0000000140)=""/5, 0x5) 03:37:55 executing program 3: r0 = memfd_create(&(0x7f0000000340)='\x00', 0x0) fsetxattr(r0, &(0x7f0000000180)=@known='security.ima\x00', &(0x7f0000000380)="002fb4e5878d1bbd7a33882e0147df80e95b1e3b80c03149893834fd8a776a0fcb31037ec38d83a720b085a51275653f57770dd38336c7b5c6e9087388f5b68b363032ecb8166958f83e2d0979", 0x4d, 0x0) fgetxattr(r0, &(0x7f0000000100)=@known='security.ima\x00', &(0x7f0000000140)=""/5, 0x5) 03:37:56 executing program 0: clock_gettime(0xf7fffffffffffffd, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='keyring\x00', 0xffffffffffffffff}, 0xfffffe98) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xfffffffffffffdee) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getpgid(0xffffffffffffffff) getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:37:56 executing program 3: clock_gettime(0xf7fffffffffffffd, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='keyring\x00', 0xffffffffffffffff}, 0xfffffe98) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xfffffffffffffdee) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getpgid(0xffffffffffffffff) getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:37:56 executing program 4: semget(0x0, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000280)=""/194) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1f4b}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") mq_open(&(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0, &(0x7f0000000140)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000600)) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=""/80, 0x50, 0xffffffffffffffff}}, 0x10) mq_open(&(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0, &(0x7f0000000480)) set_thread_area(&(0x7f0000000080)) 03:37:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0x600) 03:37:56 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0x600) 03:37:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:57 executing program 0: clock_gettime(0xf7fffffffffffffd, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='keyring\x00', 0xffffffffffffffff}, 0xfffffe98) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xfffffffffffffdee) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getpgid(0xffffffffffffffff) getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:37:57 executing program 3: clock_gettime(0xf7fffffffffffffd, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='keyring\x00', 0xffffffffffffffff}, 0xfffffe98) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xfffffffffffffdee) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getpgid(0xffffffffffffffff) getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:37:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0x600) 03:37:57 executing program 4: semget(0x0, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000280)=""/194) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1f4b}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:57 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0x600) 03:37:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:57 executing program 0: clock_gettime(0xf7fffffffffffffd, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='keyring\x00', 0xffffffffffffffff}, 0xfffffe98) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xfffffffffffffdee) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getpgid(0xffffffffffffffff) getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:37:57 executing program 3: clock_gettime(0xf7fffffffffffffd, &(0x7f00000001c0)) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getgid() lstat(&(0x7f0000002400)='./file0/file0\x00', &(0x7f0000002440)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f00000024c0)='keyring\x00', 0xffffffffffffffff}, 0xfffffe98) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xfffffffffffffdee) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002680)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002a80)) getgroups(0x0, &(0x7f0000002ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c00)) getgid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004480)) getgid() getpgid(0xffffffffffffffff) getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000004780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005c00)) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000005c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005d00), &(0x7f0000005d40)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005d80)) getegid() add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:37:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:58 executing program 4: semget(0x0, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000280)=""/194) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1f4b}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0x600) 03:37:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) gettid() getuid() getgroups(0x0, &(0x7f0000001a00)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001a40)='cgroup.type\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000001ac0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgroups(0x0, &(0x7f0000004780)) syz_open_dev$mouse(&(0x7f00000047c0)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) socket$key(0xf, 0x3, 0x2) accept$inet6(0xffffffffffffff9c, &(0x7f0000004800)={0xa, 0x0, 0x0, @local}, &(0x7f0000004840)=0x1c) socket$inet(0x2, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000004880)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000048c0)) syz_open_dev$dri(&(0x7f0000004900)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000004940)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) inotify_init() creat(&(0x7f00000049c0)='./file0/file0\x00', 0x0) socket$kcm(0x29, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getgroups(0x0, &(0x7f0000004a80)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004ac0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000004bc0)=0xe8) getgroups(0x0, &(0x7f0000004c00)) openat$zero(0xffffffffffffff9c, &(0x7f0000004c40)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000004c80)) socket$nl_crypto(0x10, 0x3, 0x15) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000005100)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000005180)='/dev/mixer\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000051c0)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000005200)='./file0\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000005240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000005280)) socket$can_bcm(0x1d, 0x2, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000005680)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000056c0)={0xffffffffffffffff}, 0xc) memfd_create(&(0x7f0000005700)='^GPLvmnet0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000005740)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000005780)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000005800)) userfaultfd(0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000005a40)) fstat(0xffffffffffffff9c, &(0x7f0000005a80)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000005b00)='\x00'}, 0x30) lstat(&(0x7f0000005b80)='./file0\x00', &(0x7f0000005bc0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000005ec0), &(0x7f0000005f00), &(0x7f0000005f40)) stat(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000006040)='@\x00', 0xffffffffffffffff}, 0x30) getuid() lstat(&(0x7f00000060c0)='./file0\x00', &(0x7f0000006100)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000006180)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:37:58 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000290007031dfffd946f", 0xd}], 0x1}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) 03:37:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000290007031dfffd946f", 0xd}], 0x1}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) 03:37:59 executing program 4: semget(0x0, 0x0, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000280)=""/194) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1f4b}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:59 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @broadcast}}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000680)) modify_ldt$read_default(0x2, &(0x7f00000009c0)=""/248, 0xce) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@loopback}}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000840)={@local, @mcast1, @remote}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000fc0)=""/154) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) 03:37:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0x600) 03:37:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:37:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000290007031dfffd946f", 0xd}], 0x1}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) 03:37:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000040)=0x600) 03:37:59 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000290007031dfffd946f", 0xd}], 0x1}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) 03:37:59 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xffffffffffffffff) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0x133) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") [ 849.055880] cgroup: fork rejected by pids controller in /syz0 03:37:59 executing program 0: times(&(0x7f0000000040)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) syz_open_dev$sndpcmp(&(0x7f00000040c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000004100)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000680)) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0), 0x0, &(0x7f0000000600)}, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_pts(0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2b, 0x0, 0x0) poll(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000007c0)={'bpq0\x00'}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000700)="dcde0e59efb11b7519f9dbc57be61360", 0xfffffffffffffecd) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, &(0x7f0000000600)) 03:38:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) gettid() getuid() getgroups(0x0, &(0x7f0000001a00)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001a40)='cgroup.type\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000001ac0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgroups(0x0, &(0x7f0000004780)) syz_open_dev$mouse(&(0x7f00000047c0)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) socket$key(0xf, 0x3, 0x2) accept$inet6(0xffffffffffffff9c, &(0x7f0000004800)={0xa, 0x0, 0x0, @local}, &(0x7f0000004840)=0x1c) socket$inet(0x2, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000004880)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000048c0)) syz_open_dev$dri(&(0x7f0000004900)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000004940)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) inotify_init() creat(&(0x7f00000049c0)='./file0/file0\x00', 0x0) socket$kcm(0x29, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getgroups(0x0, &(0x7f0000004a80)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004ac0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000004bc0)=0xe8) getgroups(0x0, &(0x7f0000004c00)) openat$zero(0xffffffffffffff9c, &(0x7f0000004c40)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000004c80)) socket$nl_crypto(0x10, 0x3, 0x15) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000005100)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000005180)='/dev/mixer\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000051c0)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000005200)='./file0\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000005240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000005280)) socket$can_bcm(0x1d, 0x2, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000005680)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000056c0)={0xffffffffffffffff}, 0xc) memfd_create(&(0x7f0000005700)='^GPLvmnet0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000005740)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000005780)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000005800)) userfaultfd(0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000005a40)) fstat(0xffffffffffffff9c, &(0x7f0000005a80)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000005b00)='\x00'}, 0x30) lstat(&(0x7f0000005b80)='./file0\x00', &(0x7f0000005bc0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000005ec0), &(0x7f0000005f00), &(0x7f0000005f40)) stat(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000006040)='@\x00', 0xffffffffffffffff}, 0x30) getuid() lstat(&(0x7f00000060c0)='./file0\x00', &(0x7f0000006100)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000006180)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:38:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000080), &(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000000080)) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='proc\x00', 0x0, &(0x7f00000012c0)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) 03:38:00 executing program 4: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$void(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000640), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @multicast2, @local}, &(0x7f0000000700)=0xc) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000740), 0x10, &(0x7f0000000800)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000500)) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), 0x4) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000680)) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000005c0)={0x0, 0x0, 0x0, &(0x7f0000000580)}) getgroups(0x0, &(0x7f0000000540)) setitimer(0x0, &(0x7f0000000500)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000540)) pipe2$9p(&(0x7f0000000040), 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb2900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2d89f7e") add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) 03:38:00 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @broadcast}}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000680)) modify_ldt$read_default(0x2, &(0x7f00000009c0)=""/248, 0xce) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@loopback}}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000840)={@local, @mcast1, @remote}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000fc0)=""/154) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) 03:38:00 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xffffffffffffffff) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0x133) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:38:00 executing program 1: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @broadcast}}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000680)) modify_ldt$read_default(0x2, &(0x7f00000009c0)=""/248, 0xce) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@loopback}}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000840)={@local, @mcast1, @remote}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000fc0)=""/154) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) 03:38:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) gettid() getuid() getgroups(0x0, &(0x7f0000001a00)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001a40)='cgroup.type\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000001ac0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgroups(0x0, &(0x7f0000004780)) syz_open_dev$mouse(&(0x7f00000047c0)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) socket$key(0xf, 0x3, 0x2) accept$inet6(0xffffffffffffff9c, &(0x7f0000004800)={0xa, 0x0, 0x0, @local}, &(0x7f0000004840)=0x1c) socket$inet(0x2, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000004880)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000048c0)) syz_open_dev$dri(&(0x7f0000004900)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000004940)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) inotify_init() creat(&(0x7f00000049c0)='./file0/file0\x00', 0x0) socket$kcm(0x29, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getgroups(0x0, &(0x7f0000004a80)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004ac0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000004bc0)=0xe8) getgroups(0x0, &(0x7f0000004c00)) openat$zero(0xffffffffffffff9c, &(0x7f0000004c40)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000004c80)) socket$nl_crypto(0x10, 0x3, 0x15) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000005100)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000005180)='/dev/mixer\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000051c0)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000005200)='./file0\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000005240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000005280)) socket$can_bcm(0x1d, 0x2, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000005680)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000056c0)={0xffffffffffffffff}, 0xc) memfd_create(&(0x7f0000005700)='^GPLvmnet0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000005740)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000005780)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000005800)) userfaultfd(0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000005a40)) fstat(0xffffffffffffff9c, &(0x7f0000005a80)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000005b00)='\x00'}, 0x30) lstat(&(0x7f0000005b80)='./file0\x00', &(0x7f0000005bc0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000005ec0), &(0x7f0000005f00), &(0x7f0000005f40)) stat(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000006040)='@\x00', 0xffffffffffffffff}, 0x30) getuid() lstat(&(0x7f00000060c0)='./file0\x00', &(0x7f0000006100)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000006180)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:38:01 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @broadcast}}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000680)) modify_ldt$read_default(0x2, &(0x7f00000009c0)=""/248, 0xce) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@loopback}}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000840)={@local, @mcast1, @remote}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000fc0)=""/154) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) 03:38:01 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xffffffffffffffff) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0x133) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:38:01 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@hci, &(0x7f0000000640)=0x80) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:01 executing program 1: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @broadcast}}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000680)) modify_ldt$read_default(0x2, &(0x7f00000009c0)=""/248, 0xce) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@loopback}}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000840)={@local, @mcast1, @remote}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000fc0)=""/154) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) [ 851.484725] IPVS: ftp: loaded support on port[0] = 21 03:38:02 executing program 2: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @broadcast}}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000680)) modify_ldt$read_default(0x2, &(0x7f00000009c0)=""/248, 0xce) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@loopback}}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000840)={@local, @mcast1, @remote}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000fc0)=""/154) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) 03:38:02 executing program 4: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$void(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000640), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @multicast2, @local}, &(0x7f0000000700)=0xc) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000740), 0x10, &(0x7f0000000800)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000500)) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), 0x4) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000680)) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000005c0)={0x0, 0x0, 0x0, &(0x7f0000000580)}) getgroups(0x0, &(0x7f0000000540)) setitimer(0x0, &(0x7f0000000500)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000540)) pipe2$9p(&(0x7f0000000040), 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb2900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2d89f7e") add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) 03:38:02 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xffffffffffffffff) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0x133) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:38:02 executing program 1: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000240), &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x8) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @loopback}, {}, {0x2, 0x0, @broadcast}}) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000680)) modify_ldt$read_default(0x2, &(0x7f00000009c0)=""/248, 0xce) syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) request_key(&(0x7f0000000200)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300)='/dev/full\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000380)='/dev/full\x00') pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000001c0), 0x4) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0956969ef69dc00d99069203737c3397c2a450f01d60f38211ac4c207dd2bf3f3a70f157a9e400f01ef640f1b7996417545c462010d42002e1a1a3ef0d7f65855010131a3b786e2989fc4227992749f55") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@loopback}}}, &(0x7f0000000800)=0xe8) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000840)={@local, @mcast1, @remote}) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000fc0)=""/154) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_DROP_MASTER(0xffffffffffffffff, 0x641f) 03:38:03 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:03 executing program 5: getrlimit(0xffffffffffffffff, &(0x7f00000003c0)) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:38:03 executing program 4: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$void(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000640), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @multicast2, @local}, &(0x7f0000000700)=0xc) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000740), 0x10, &(0x7f0000000800)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000500)) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), 0x4) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000680)) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000005c0)={0x0, 0x0, 0x0, &(0x7f0000000580)}) getgroups(0x0, &(0x7f0000000540)) setitimer(0x0, &(0x7f0000000500)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000540)) pipe2$9p(&(0x7f0000000040), 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb2900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2d89f7e") add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) 03:38:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000500)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) gettid() getuid() getgroups(0x0, &(0x7f0000001a00)) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000001a40)='cgroup.type\x00', 0x2, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000001ac0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getgroups(0x0, &(0x7f0000004780)) syz_open_dev$mouse(&(0x7f00000047c0)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) socket$key(0xf, 0x3, 0x2) accept$inet6(0xffffffffffffff9c, &(0x7f0000004800)={0xa, 0x0, 0x0, @local}, &(0x7f0000004840)=0x1c) socket$inet(0x2, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000004880)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000048c0)) syz_open_dev$dri(&(0x7f0000004900)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000004940)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) inotify_init() creat(&(0x7f00000049c0)='./file0/file0\x00', 0x0) socket$kcm(0x29, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getgroups(0x0, &(0x7f0000004a80)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004ac0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000004bc0)=0xe8) getgroups(0x0, &(0x7f0000004c00)) openat$zero(0xffffffffffffff9c, &(0x7f0000004c40)='/dev/zero\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000004c80)) socket$nl_crypto(0x10, 0x3, 0x15) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000005100)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000005140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000005180)='/dev/mixer\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000051c0)) accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000005200)='./file0\x00', 0x0, 0x0) accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000005240)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000005280)) socket$can_bcm(0x1d, 0x2, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000005680)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000056c0)={0xffffffffffffffff}, 0xc) memfd_create(&(0x7f0000005700)='^GPLvmnet0\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000005740)) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000005780)='/dev/qat_adf_ctl\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000057c0)='/dev/ppp\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000005800)) userfaultfd(0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000005a40)) fstat(0xffffffffffffff9c, &(0x7f0000005a80)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005b40)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000005b00)='\x00'}, 0x30) lstat(&(0x7f0000005b80)='./file0\x00', &(0x7f0000005bc0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000005ec0), &(0x7f0000005f00), &(0x7f0000005f40)) stat(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006080)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f0000006040)='@\x00', 0xffffffffffffffff}, 0x30) getuid() lstat(&(0x7f00000060c0)='./file0\x00', &(0x7f0000006100)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000006180)) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") 03:38:03 executing program 1: clone(0xfffffff4, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000140), 0x8) syz_execute_func(&(0x7f0000000040)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:04 executing program 4: request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180), &(0x7f00000001c0)='\x00', 0xfffffffffffffff9) shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$void(0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000600)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000640), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @multicast2, @local}, &(0x7f0000000700)=0xc) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000740), 0x10, &(0x7f0000000800)}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000500)) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000880), 0x4) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000680)) ioctl$KVM_HAS_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee3, &(0x7f00000005c0)={0x0, 0x0, 0x0, &(0x7f0000000580)}) getgroups(0x0, &(0x7f0000000540)) setitimer(0x0, &(0x7f0000000500)={{0x0, 0x7530}, {0x77359400}}, &(0x7f0000000540)) pipe2$9p(&(0x7f0000000040), 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb2900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2d89f7e") add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) [ 855.285306] bridge0: port 1(bridge_slave_0) entered blocking state [ 855.292155] bridge0: port 1(bridge_slave_0) entered disabled state [ 855.299514] device bridge_slave_0 entered promiscuous mode [ 855.348767] bridge0: port 2(bridge_slave_1) entered blocking state [ 855.355198] bridge0: port 2(bridge_slave_1) entered disabled state [ 855.362261] device bridge_slave_1 entered promiscuous mode [ 855.429541] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 855.459766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 855.561780] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 855.631648] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 855.837053] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 855.844299] team0: Port device team_slave_0 added [ 855.889410] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 855.896919] team0: Port device team_slave_1 added [ 855.923439] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 855.981356] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 856.011527] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 856.018942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 856.027015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 856.111088] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 856.118345] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 856.126385] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 856.530577] bridge0: port 2(bridge_slave_1) entered blocking state [ 856.536983] bridge0: port 2(bridge_slave_1) entered forwarding state [ 856.543567] bridge0: port 1(bridge_slave_0) entered blocking state [ 856.549986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 856.557196] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 856.627551] device bridge_slave_1 left promiscuous mode [ 856.633090] bridge0: port 2(bridge_slave_1) entered disabled state [ 856.677135] device bridge_slave_0 left promiscuous mode [ 856.682580] bridge0: port 1(bridge_slave_0) entered disabled state [ 858.701961] team0 (unregistering): Port device team_slave_1 removed [ 858.713241] team0 (unregistering): Port device team_slave_0 removed [ 858.723919] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 858.779368] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 858.856071] bond0 (unregistering): Released all slaves [ 858.922368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 860.381882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 860.517476] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 860.642642] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 860.648941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 860.656961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 860.771147] 8021q: adding VLAN 0 to HW filter on device team0 03:38:11 executing program 3: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:38:11 executing program 5: getrlimit(0xffffffffffffffff, &(0x7f00000003c0)) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:38:11 executing program 1: clone(0xfffffff4, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000140), 0x8) syz_execute_func(&(0x7f0000000040)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:11 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000880)) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@multicast1, @in=@broadcast}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:11 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@hci, &(0x7f0000000640)=0x80) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:11 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:11 executing program 3: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:38:11 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@hci, &(0x7f0000000640)=0x80) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:12 executing program 3: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:38:12 executing program 0: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@hci, &(0x7f0000000640)=0x80) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:12 executing program 0: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:38:12 executing program 3: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:38:12 executing program 0: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:38:12 executing program 5: getrlimit(0xffffffffffffffff, &(0x7f00000003c0)) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:38:12 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:12 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000880)) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@multicast1, @in=@broadcast}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:12 executing program 1: clone(0xfffffff4, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000140), 0x8) syz_execute_func(&(0x7f0000000040)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:12 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:12 executing program 0: pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') pipe(&(0x7f0000000700)) sysfs$2(0x4, 0x0, &(0x7f0000000380)=""/163) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x11, &(0x7f00000005c0)={@dev, @empty, [], {@llc={0x4, {@llc={0x0, 0x0, 'd'}}}}}, &(0x7f0000000040)) chroot(&(0x7f00000000c0)='./file0\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc0f01ee8141ff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000200)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe03e404001efe5e57d0fecec1a1a0946b10f0fee45dfde9f") 03:38:13 executing program 0: unshare(0x10010000) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000040), 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @host}, 0x10) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140), &(0x7f0000000180)) timer_delete(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:13 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:13 executing program 5: getrlimit(0xffffffffffffffff, &(0x7f00000003c0)) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:38:13 executing program 1: clone(0xfffffff4, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000240), &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000140), 0x8) syz_execute_func(&(0x7f0000000040)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:13 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000fee000/0x4000)=nil) pipe2(&(0x7f0000000100), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001700)) openat$kvm(0xffffffffffffff9c, &(0x7f0000001740)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) syz_open_dev$sndmidi(&(0x7f0000001b80)='/dev/snd/midiC#D#\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001c40), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c80)) fstat(0xffffffffffffff9c, &(0x7f0000001e00)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001ec0)) lstat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) getresgid(&(0x7f0000001fc0), &(0x7f0000002000), &(0x7f0000002040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000020c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0x5) getresgid(&(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000022c0)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000002300)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000002340)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000002380)) bpf$MAP_CREATE(0x0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000002400)='/dev/snd/seq\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:13 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000880)) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@multicast1, @in=@broadcast}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:13 executing program 0: unshare(0x10010000) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000040), 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @host}, 0x10) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140), &(0x7f0000000180)) timer_delete(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:14 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:14 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) 03:38:14 executing program 1: clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400000000000005, &(0x7f0000000340)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote, @rand_addr=0x100}, 0x10) 03:38:14 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:14 executing program 1: clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400000000000005, &(0x7f0000000340)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote, @rand_addr=0x100}, 0x10) 03:38:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x8001) dup3(r0, r1, 0x0) 03:38:14 executing program 1: clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400000000000005, &(0x7f0000000340)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote, @rand_addr=0x100}, 0x10) 03:38:14 executing program 1: clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = socket(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x400000000000005, &(0x7f0000000340)) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@remote, @rand_addr=0x100}, 0x10) 03:38:14 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x8001) dup3(r0, r1, 0x0) 03:38:14 executing program 0: unshare(0x10010000) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000040), 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @host}, 0x10) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140), &(0x7f0000000180)) timer_delete(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x8001) dup3(r0, r1, 0x0) 03:38:15 executing program 4: keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$NBD_CLEAR_QUE(0xffffffffffffffff, 0xab05) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue1\x00'}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f0000000500)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getgroups(0x0, &(0x7f0000000780)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000880)) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0), &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@multicast1, @in=@broadcast}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000a40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:15 executing program 3: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) openat(0xffffffffffffffff, &(0x7f0000002840)='./file0\x00', 0x0, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x8001) dup3(r0, r1, 0x0) 03:38:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x8001) dup3(r0, r1, 0x0) 03:38:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:15 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x8001) dup3(r0, r1, 0x0) 03:38:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x8001) dup3(r0, r1, 0x0) 03:38:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:15 executing program 0: unshare(0x10010000) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000040), 0x0) bind$vsock_dgram(0xffffffffffffffff, &(0x7f00000001c0)={0x28, 0x0, 0x0, @host}, 0x10) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000140)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140), &(0x7f0000000180)) timer_delete(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f14157a9e3e643e66f26fe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x9, &(0x7f0000000300)=""/166, &(0x7f0000000140)=0x10) 03:38:16 executing program 3: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() getuid() 03:38:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x9, &(0x7f0000000300)=""/166, &(0x7f0000000140)=0x10) 03:38:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:16 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x5eb, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000001580)}, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001a80)=ANY=[@ANYBLOB], 0x0) recvmsg$kcm(r0, &(0x7f0000000e00)={&(0x7f0000000c00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000c80)=""/135, 0x87}, {&(0x7f0000000d40)=""/120, 0x78}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000, 0xffe0000000000}, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000e40)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 03:38:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x9, &(0x7f0000000300)=""/166, &(0x7f0000000140)=0x10) 03:38:16 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x9, &(0x7f0000000300)=""/166, &(0x7f0000000140)=0x10) 03:38:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x104d}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd, 0x0, 0x2}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 03:38:16 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x104d}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd, 0x0, 0x2}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 03:38:17 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffe) pipe(&(0x7f00000001c0)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000280)) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f00000007c0), 0x4) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000780)={0x18}, 0x18) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) getpgid(0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) finit_module(0xffffffffffffffff, &(0x7f0000000100)='wlan1{cpuset[vmnet1eth1', 0x0) semget(0xffffffffffffffff, 0x0, 0x0) 03:38:17 executing program 2: ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)) socketpair$inet(0x2, 0x2, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/199) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") [ 866.860441] cgroup: fork rejected by pids controller in /syz1 03:38:17 executing program 3: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() getuid() 03:38:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000080)="0f015eda66b8000001000f23d00f21f86635300000050f23f82e0f23ca360f3566b9800000c00f326635001000000f30260f01d167360fc72d92180000670f01c867f0111ce7260f01b9040c", 0x4c}], 0x190, 0x0, &(0x7f0000000140), 0x10000000000000bb) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:38:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x104d}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd, 0x0, 0x2}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 03:38:17 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:17 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x104d}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd, 0x0, 0x2}, [@ldst={0x7, 0x18d1fb, 0x0, 0x1d1}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) 03:38:17 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:17 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:17 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:18 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:18 executing program 2: ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)) socketpair$inet(0x2, 0x2, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/199) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") 03:38:18 executing program 3: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() getuid() 03:38:18 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:19 executing program 3: clock_gettime(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='dctcp-reno\x00', 0xb) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") sync() getuid() 03:38:19 executing program 1: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x88) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000004c0)={0x7}, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='trustedem0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000180)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) 03:38:19 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:19 executing program 2: ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)) socketpair$inet(0x2, 0x2, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/199) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") 03:38:19 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) writev(0xffffffffffffffff, &(0x7f0000e11ff0), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffe}}, 0x14}}, 0x0) 03:38:19 executing program 0: clock_getres(0x8, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000000)=""/26, 0x1a, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 870.017726] IPVS: ftp: loaded support on port[0] = 21 03:38:20 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:38:20 executing program 3: clock_gettime(0x7, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000002d00)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:20 executing program 2: ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)) socketpair$inet(0x2, 0x2, 0x0, &(0x7f0000000080)) geteuid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000340)) mincore(&(0x7f0000ff4000/0xc000)=nil, 0xc000, &(0x7f0000000700)=""/4096) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000240)={0x8}, 0x8) ustat(0x0, &(0x7f0000000200)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000180)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000580)=""/199) syz_execute_func(&(0x7f0000000680)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a1f40a8a5a8a541dfe0400f01ef7d0f2e1a1a01460f36660fd3600931a3b786e2989fc46178ae579b") 03:38:20 executing program 4: clock_getres(0x0, &(0x7f00000003c0)) times(&(0x7f0000000200)) memfd_create(&(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700), &(0x7f0000001740)=0xc) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) fstat(0xffffffffffffffff, &(0x7f0000001840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000018c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d40)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001e80)=0xffffffffffffff02) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in=@multicast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001b80)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f00000016c0), 0x0, &(0x7f0000001c00)=ANY=[]}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000380)) nanosleep(&(0x7f0000000400), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000080)=0x78) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000480), &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000640), &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700), &(0x7f0000000740)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000780), &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000004c0), &(0x7f00000006c0)=0x419b776f516bcfc1) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 03:38:21 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:38:21 executing program 2: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=@nbd={'/dev/nbd'}, &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@ipv4={[], [], @local}}, &(0x7f0000000880)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @rand_addr, @multicast1}, &(0x7f0000000e80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in6, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f0000001040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001080)={@remote, @multicast2}, &(0x7f00000010c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast2}, &(0x7f0000001200)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000002280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002400), 0x0, &(0x7f0000002440)=""/232, 0xe8}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in6=@mcast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000002680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002700)=0xfffffffffffffd02) getpeername$packet(0xffffffffffffffff, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000002900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940), &(0x7f0000002980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c80)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@loopback}}, &(0x7f0000002d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000002f00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003080)={@broadcast, @local}, &(0x7f00000030c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003100)={@mcast2}, &(0x7f0000003140)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000031c0), &(0x7f0000003200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003ec0)={'bond_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004080)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000040c0)={{{@in, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000041c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004200)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000004300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000004580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004780)=0xfffffffffffffdc2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000047c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000048c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004900)={@multicast1, @multicast1}, &(0x7f0000004940)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004a40)={0x0, @rand_addr, @broadcast}, &(0x7f0000004a80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in=@dev, @in=@loopback}}, {{@in=@local}}}, &(0x7f0000004d00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007c80)={'dummy0\x00'}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") [ 873.799374] device bridge_slave_1 left promiscuous mode [ 873.808849] bridge0: port 2(bridge_slave_1) entered disabled state [ 873.846813] device bridge_slave_0 left promiscuous mode [ 873.852327] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.889823] team0 (unregistering): Port device team_slave_1 removed [ 875.900231] team0 (unregistering): Port device team_slave_0 removed [ 875.910586] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 875.959259] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 876.036033] bond0 (unregistering): Released all slaves [ 876.153457] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.160179] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.167359] device bridge_slave_0 entered promiscuous mode [ 876.194750] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.201289] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.208519] device bridge_slave_1 entered promiscuous mode [ 876.236624] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 876.264658] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 876.401485] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 876.451942] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 876.667736] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 876.675210] team0: Port device team_slave_0 added [ 876.719859] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 876.727398] team0: Port device team_slave_1 added [ 876.770815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 876.817632] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 876.866013] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 876.918810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 877.372096] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.378523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 877.385203] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.391624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 877.399086] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 878.165915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 878.452872] 8021q: adding VLAN 0 to HW filter on device bond0 [ 878.541174] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 878.629871] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 878.636215] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 878.643200] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 878.733825] 8021q: adding VLAN 0 to HW filter on device team0 03:38:30 executing program 4: clock_getres(0x0, &(0x7f00000003c0)) times(&(0x7f0000000200)) memfd_create(&(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700), &(0x7f0000001740)=0xc) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) fstat(0xffffffffffffffff, &(0x7f0000001840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000018c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d40)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001e80)=0xffffffffffffff02) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in=@multicast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001b80)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f00000016c0), 0x0, &(0x7f0000001c00)=ANY=[]}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000380)) nanosleep(&(0x7f0000000400), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000080)=0x78) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000480), &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000640), &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700), &(0x7f0000000740)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000780), &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000004c0), &(0x7f00000006c0)=0x419b776f516bcfc1) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 03:38:30 executing program 3: clock_gettime(0x7, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000002d00)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:30 executing program 0: clock_getres(0x8, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000000)=""/26, 0x1a, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:30 executing program 1: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x88) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000004c0)={0x7}, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='trustedem0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000180)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) 03:38:30 executing program 2: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=@nbd={'/dev/nbd'}, &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@ipv4={[], [], @local}}, &(0x7f0000000880)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @rand_addr, @multicast1}, &(0x7f0000000e80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in6, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f0000001040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001080)={@remote, @multicast2}, &(0x7f00000010c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast2}, &(0x7f0000001200)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000002280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002400), 0x0, &(0x7f0000002440)=""/232, 0xe8}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in6=@mcast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000002680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002700)=0xfffffffffffffd02) getpeername$packet(0xffffffffffffffff, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000002900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940), &(0x7f0000002980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c80)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@loopback}}, &(0x7f0000002d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000002f00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003080)={@broadcast, @local}, &(0x7f00000030c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003100)={@mcast2}, &(0x7f0000003140)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000031c0), &(0x7f0000003200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003ec0)={'bond_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004080)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000040c0)={{{@in, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000041c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004200)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000004300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000004580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004780)=0xfffffffffffffdc2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000047c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000048c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004900)={@multicast1, @multicast1}, &(0x7f0000004940)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004a40)={0x0, @rand_addr, @broadcast}, &(0x7f0000004a80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in=@dev, @in=@loopback}}, {{@in=@local}}}, &(0x7f0000004d00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007c80)={'dummy0\x00'}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:30 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:38:31 executing program 4: clock_getres(0x0, &(0x7f00000003c0)) times(&(0x7f0000000200)) memfd_create(&(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700), &(0x7f0000001740)=0xc) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) fstat(0xffffffffffffffff, &(0x7f0000001840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000018c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d40)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001e80)=0xffffffffffffff02) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in=@multicast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001b80)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f00000016c0), 0x0, &(0x7f0000001c00)=ANY=[]}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000380)) nanosleep(&(0x7f0000000400), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000080)=0x78) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000480), &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000640), &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700), &(0x7f0000000740)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000780), &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000004c0), &(0x7f00000006c0)=0x419b776f516bcfc1) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 03:38:31 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") 03:38:31 executing program 3: clock_gettime(0x7, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000002d00)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:31 executing program 2: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=@nbd={'/dev/nbd'}, &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@ipv4={[], [], @local}}, &(0x7f0000000880)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @rand_addr, @multicast1}, &(0x7f0000000e80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in6, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f0000001040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001080)={@remote, @multicast2}, &(0x7f00000010c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast2}, &(0x7f0000001200)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000002280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002400), 0x0, &(0x7f0000002440)=""/232, 0xe8}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in6=@mcast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000002680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002700)=0xfffffffffffffd02) getpeername$packet(0xffffffffffffffff, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000002900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940), &(0x7f0000002980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c80)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@loopback}}, &(0x7f0000002d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000002f00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003080)={@broadcast, @local}, &(0x7f00000030c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003100)={@mcast2}, &(0x7f0000003140)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000031c0), &(0x7f0000003200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003ec0)={'bond_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004080)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000040c0)={{{@in, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000041c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004200)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000004300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000004580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004780)=0xfffffffffffffdc2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000047c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000048c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004900)={@multicast1, @multicast1}, &(0x7f0000004940)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004a40)={0x0, @rand_addr, @broadcast}, &(0x7f0000004a80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in=@dev, @in=@loopback}}, {{@in=@local}}}, &(0x7f0000004d00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007c80)={'dummy0\x00'}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:31 executing program 0: clock_getres(0x8, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000000)=""/26, 0x1a, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:31 executing program 1: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x88) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000004c0)={0x7}, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='trustedem0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000180)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) 03:38:32 executing program 4: clock_getres(0x0, &(0x7f00000003c0)) times(&(0x7f0000000200)) memfd_create(&(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700), &(0x7f0000001740)=0xc) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) fstat(0xffffffffffffffff, &(0x7f0000001840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000018c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d40)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001e80)=0xffffffffffffff02) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in=@multicast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001b80)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f00000016c0), 0x0, &(0x7f0000001c00)=ANY=[]}, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000380)) nanosleep(&(0x7f0000000400), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab04) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000080)=0x78) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000480), &(0x7f0000000600)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000640), &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000700), &(0x7f0000000740)=0x20) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000780), &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000004c0), &(0x7f00000006c0)=0x419b776f516bcfc1) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 03:38:32 executing program 5: times(&(0x7f0000000200)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) gettid() getpid() gettid() getpgrp(0x0) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:38:32 executing program 2: getrlimit(0x0, &(0x7f0000000140)) mount(&(0x7f0000000500)=@nbd={'/dev/nbd'}, &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840)={@ipv4={[], [], @local}}, &(0x7f0000000880)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e40)={0x0, @rand_addr, @multicast1}, &(0x7f0000000e80)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in6, @in=@dev}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@loopback}}, &(0x7f0000001040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001080)={@remote, @multicast2}, &(0x7f00000010c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000011c0)={@mcast2}, &(0x7f0000001200)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000002280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002400), 0x0, &(0x7f0000002440)=""/232, 0xe8}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in6=@mcast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000002680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002700)=0xfffffffffffffd02) getpeername$packet(0xffffffffffffffff, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002800)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000002900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002940), &(0x7f0000002980)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b80)={@ipv4={[], [], @multicast1}}, &(0x7f0000002bc0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002c00)={@remote}, &(0x7f0000002c40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002c80)={{{@in6=@remote, @in=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@loopback}}, &(0x7f0000002d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000002f00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002f80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003080)={@broadcast, @local}, &(0x7f00000030c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003100)={@mcast2}, &(0x7f0000003140)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000031c0), &(0x7f0000003200)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003ec0)={'bond_slave_1\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004080)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000040c0)={{{@in, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000041c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004200)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000004300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004480)={{{@in6, @in6}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000004580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000004780)=0xfffffffffffffdc2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000047c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000048c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004900)={@multicast1, @multicast1}, &(0x7f0000004940)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004a40)={0x0, @rand_addr, @broadcast}, &(0x7f0000004a80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000004ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004b00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c00)={{{@in=@dev, @in=@loopback}}, {{@in=@local}}}, &(0x7f0000004d00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007c80)={'dummy0\x00'}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:32 executing program 3: clock_gettime(0x7, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001a80)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000002d00)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:32 executing program 1: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000480), 0x4) syz_open_dev$dri(&(0x7f0000000600)='/dev/dri/card#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000400)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x88) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000004c0)={0x7}, 0x7) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='trustedem0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)={&(0x7f0000000180)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer\x00', 0x0, 0x0) 03:38:32 executing program 0: clock_getres(0x8, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000000)=""/26, 0x1a, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:33 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000003580), &(0x7f00000035c0)=0x8) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@loopback, @broadcast}, 0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000003600)=@assoc_value, &(0x7f0000003640)=0x8) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e00)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:33 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)) iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x1000) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) prctl$setmm(0x23, 0x0, &(0x7f000064b000/0x4000)=nil) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000001c0)) pipe(&(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_execute_func(&(0x7f0000000240)="42805da06a0f460fc4a205b6930080000001ee263a208600d7c0c1762e660f3a20cc0066662626660f69b2000000002900c4e1985f560c0f0f99583dda10030606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adf3400fe6d07e") 03:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002a0007031dfffd946fa2830020200a000900000006000000000000000d00ff7e", 0x24}], 0x1}, 0x0) 03:38:33 executing program 1: semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 03:38:33 executing program 5: times(&(0x7f0000000200)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) gettid() getpid() gettid() getpgrp(0x0) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002a0007031dfffd946fa2830020200a000900000006000000000000000d00ff7e", 0x24}], 0x1}, 0x0) 03:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002a0007031dfffd946fa2830020200a000900000006000000000000000d00ff7e", 0x24}], 0x1}, 0x0) 03:38:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002a0007031dfffd946fa2830020200a000900000006000000000000000d00ff7e", 0x24}], 0x1}, 0x0) 03:38:33 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:34 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000003580), &(0x7f00000035c0)=0x8) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@loopback, @broadcast}, 0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000003600)=@assoc_value, &(0x7f0000003640)=0x8) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e00)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:34 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)) iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x1000) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) prctl$setmm(0x23, 0x0, &(0x7f000064b000/0x4000)=nil) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000001c0)) pipe(&(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_execute_func(&(0x7f0000000240)="42805da06a0f460fc4a205b6930080000001ee263a208600d7c0c1762e660f3a20cc0066662626660f69b2000000002900c4e1985f560c0f0f99583dda10030606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adf3400fe6d07e") 03:38:34 executing program 5: times(&(0x7f0000000200)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) gettid() getpid() gettid() getpgrp(0x0) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:38:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:34 executing program 1: semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 03:38:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:34 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:35 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000003580), &(0x7f00000035c0)=0x8) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@loopback, @broadcast}, 0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000003600)=@assoc_value, &(0x7f0000003640)=0x8) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e00)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) flistxattr(r2, &(0x7f0000000540)=""/4096, 0x1002) 03:38:35 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)) iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x1000) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) prctl$setmm(0x23, 0x0, &(0x7f000064b000/0x4000)=nil) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000001c0)) pipe(&(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_execute_func(&(0x7f0000000240)="42805da06a0f460fc4a205b6930080000001ee263a208600d7c0c1762e660f3a20cc0066662626660f69b2000000002900c4e1985f560c0f0f99583dda10030606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adf3400fe6d07e") 03:38:35 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000d00)=0xffffffffffffffcc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0x63) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) 03:38:35 executing program 5: times(&(0x7f0000000200)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) gettid() getpid() gettid() getpgrp(0x0) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000500)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fb4175450f2e1a67f20f2cedc4a1c173dfdcf08024030842ec4b") 03:38:35 executing program 1: semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 03:38:35 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:35 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000003580), &(0x7f00000035c0)=0x8) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@loopback, @broadcast}, 0xc) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000003600)=@assoc_value, &(0x7f0000003640)=0x8) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000019c0), &(0x7f0000001a00), &(0x7f0000001a40)) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e00)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:36 executing program 5: prctl$setname(0x24, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:36 executing program 3: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000140)) iopl(0x0) add_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000680), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) accept$alg(0xffffffffffffff9c, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x1000) semget(0xffffffffffffffff, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) prctl$setmm(0x23, 0x0, &(0x7f000064b000/0x4000)=nil) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000001c0)) pipe(&(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') syz_execute_func(&(0x7f0000000240)="42805da06a0f460fc4a205b6930080000001ee263a208600d7c0c1762e660f3a20cc0066662626660f69b2000000002900c4e1985f560c0f0f99583dda10030606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adf3400fe6d07e") 03:38:36 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000d00)=0xffffffffffffffcc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0x63) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) 03:38:36 executing program 1: semget$private(0x0, 0x2, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue1\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298edc4227992749f55") 03:38:36 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000001880), 0x0, &(0x7f0000001900)=""/23, 0x17}, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001980)={'NETMAP\x00'}, &(0x7f00000019c0)=0x1e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:36 executing program 4: fcntl$getown(0xffffffffffffff9c, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000d00)=0xffffffffffffffcc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0x63) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) 03:38:37 executing program 5: prctl$setname(0x24, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:37 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x0, 0x0) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000340), 0x8) 03:38:37 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000d00)=0xffffffffffffffcc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0x63) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) 03:38:37 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x0, 0x0) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000340), 0x8) 03:38:37 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001a00)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000000780)) 03:38:37 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x0, 0x0) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000340), 0x8) 03:38:37 executing program 0: r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f00000000c0)="040400000700000000000000fff5", 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x20000000005, @remote}, 0x1c) 03:38:37 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uhid\x00', 0x0, 0x0) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f0000000340), 0x8) [ 887.371672] hfsplus: unable to find HFS+ superblock 03:38:37 executing program 3: pipe(&(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f00000002c0)="af8055a059c402ad47bd000880419066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01ef660ff1c87d0fecec1a1a01460f01ee31a3b786e6989f") 03:38:37 executing program 0: r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f00000000c0)="040400000700000000000000fff5", 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x20000000005, @remote}, 0x1c) 03:38:37 executing program 4: fcntl$getown(0xffffffffffffff9c, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000d00)=0xffffffffffffffcc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0x63) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) 03:38:37 executing program 0: r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f00000000c0)="040400000700000000000000fff5", 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x20000000005, @remote}, 0x1c) 03:38:38 executing program 5: prctl$setname(0x24, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:38 executing program 0: r0 = socket$packet(0x11, 0x800000003, 0x300) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) sendto$inet6(r0, &(0x7f00000000c0)="040400000700000000000000fff5", 0xe, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x20000000005, @remote}, 0x1c) 03:38:38 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000d00)=0xffffffffffffffcc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0x63) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) 03:38:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) 03:38:38 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001a00)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000000780)) 03:38:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) 03:38:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) 03:38:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) 03:38:38 executing program 3: pipe(&(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f00000002c0)="af8055a059c402ad47bd000880419066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01ef660ff1c87d0fecec1a1a01460f01ee31a3b786e6989f") [ 888.368417] hfsplus: unable to find HFS+ superblock 03:38:38 executing program 4: fcntl$getown(0xffffffffffffff9c, 0x9) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000380)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000bc0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000a40)={0x0, @speck128}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000ac0)=0x14) connect$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) keyctl$invalidate(0x15, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000d00)=0xffffffffffffffcc) getresgid(&(0x7f0000000d40), &(0x7f0000000540), &(0x7f0000000dc0)) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) fstat(0xffffffffffffffff, &(0x7f00000015c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in6}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001740)=0xe8) lstat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) stat(&(0x7f0000001b00)='./file0\x00', &(0x7f0000001b40)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002380)={{{@in6, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002480)=0x63) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000024c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@loopback}}}, &(0x7f00000025c0)=0xe8) lstat(&(0x7f0000002600)='\x00', &(0x7f0000002640)) 03:38:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) 03:38:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) 03:38:39 executing program 5: prctl$setname(0x24, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="428055a0ae6969ef69dc00d90890599059ff0f1824c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:39 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000040)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) 03:38:39 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:38:39 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:39 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001a00)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000000780)) 03:38:39 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:39 executing program 3: pipe(&(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f00000002c0)="af8055a059c402ad47bd000880419066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01ef660ff1c87d0fecec1a1a01460f01ee31a3b786e6989f") [ 889.326469] hfsplus: unable to find HFS+ superblock 03:38:39 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:39 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 889.554672] ceph: device name is missing path (no : separator in /dev/loop4) 03:38:39 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:39 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:38:40 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:40 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 889.794770] ceph: device name is missing path (no : separator in /dev/loop5) 03:38:40 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000001a00)=ANY=[]) prctl$getname(0x10, &(0x7f0000000200)=""/133) semget$private(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000940)=ANY=[], 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") syz_mount_image$hfsplus(&(0x7f0000000180)='hfsplus\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001880), 0x0, &(0x7f0000000780)) 03:38:40 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 889.994736] ceph: device name is missing path (no : separator in /dev/loop4) 03:38:40 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:40 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:40 executing program 3: pipe(&(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f00000002c0)="af8055a059c402ad47bd000880419066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01ef660ff1c87d0fecec1a1a01460f01ee31a3b786e6989f") [ 890.260866] ceph: device name is missing path (no : separator in /dev/loop5) [ 890.264845] ceph: device name is missing path (no : separator in /dev/loop4) [ 890.321350] hfsplus: unable to find HFS+ superblock 03:38:40 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:40 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:40 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:40 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:38:40 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 890.670147] ceph: device name is missing path (no : separator in /dev/loop5) [ 890.741147] ceph: device name is missing path (no : separator in /dev/loop4) 03:38:41 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:41 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:41 executing program 1: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:41 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 891.079984] ceph: device name is missing path (no : separator in /dev/loop5) [ 891.114823] ceph: device name is missing path (no : separator in /dev/loop4) [ 891.151905] ceph: device name is missing path (no : separator in /dev/loop1) 03:38:41 executing program 3: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:41 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:41 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:41 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 891.438925] ceph: device name is missing path (no : separator in /dev/loop3) 03:38:41 executing program 1: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 891.500187] ceph: device name is missing path (no : separator in /dev/loop5) [ 891.537062] ceph: device name is missing path (no : separator in /dev/loop4) 03:38:41 executing program 2: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:38:41 executing program 3: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 891.719486] ceph: device name is missing path (no : separator in /dev/loop1) [ 891.921251] ceph: device name is missing path (no : separator in /dev/loop5) [ 891.932476] ceph: device name is missing path (no : separator in /dev/loop3) 03:38:42 executing program 1: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 891.963912] ceph: device name is missing path (no : separator in /dev/loop4) 03:38:42 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 3: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 892.303341] ceph: device name is missing path (no : separator in /dev/loop1) [ 892.369304] ceph: device name is missing path (no : separator in /dev/loop4) [ 892.387311] ceph: device name is missing path (no : separator in /dev/loop3) 03:38:42 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 892.421503] ceph: device name is missing path (no : separator in /dev/loop5) 03:38:42 executing program 1: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 2: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 3: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:42 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 892.785116] ceph: device name is missing path (no : separator in /dev/loop2) [ 892.852316] ceph: device name is missing path (no : separator in /dev/loop1) [ 892.854221] ceph: device name is missing path (no : separator in /dev/loop3) [ 892.863169] ceph: device name is missing path (no : separator in /dev/loop5) 03:38:43 executing program 0: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 892.926993] ceph: device name is missing path (no : separator in /dev/loop4) 03:38:43 executing program 2: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:43 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:43 executing program 1: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:43 executing program 5: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:43 executing program 3: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:43 executing program 0: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) [ 893.291265] ceph: device name is missing path (no : separator in /dev/loop2) [ 893.363509] ceph: device name is missing path (no : separator in /dev/loop4) [ 893.386354] ceph: device name is missing path (no : separator in /dev/loop1) [ 893.424074] ceph: device name is missing path (no : separator in /dev/loop3) 03:38:43 executing program 2: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 893.511419] ceph: device name is missing path (no : separator in /dev/loop5) 03:38:43 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:43 executing program 1: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x94}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:38:44 executing program 3: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) [ 893.841690] ceph: device name is missing path (no : separator in /dev/loop2) [ 893.849773] ceph: device name is missing path (no : separator in /dev/loop1) [ 893.914716] ceph: device name is missing path (no : separator in /dev/loop4) 03:38:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x94}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:38:44 executing program 2: keyctl$set_reqkey_keyring(0x17, 0xffffffffffffffff) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') dup(0xffffffffffffff9c) accept(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000380), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280), 0xc) socket$pppoe(0x18, 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080), 0xa) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:38:44 executing program 4: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000040)=""/15) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480)) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)) r3 = inotify_init1(0x0) inotify_init() r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xffffffffffffff0c, 0x48000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000540)=ANY=[@ANYRES32=0x0], &(0x7f0000000180)=0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000240)={r5, 0x1}, &(0x7f0000000280)=0x8) inotify_add_watch(r3, &(0x7f0000000200)='./file0\x00', 0x4000004080000005) inotify_add_watch(r3, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r6 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f00000002c0)) syz_mount_image$ceph(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x400, &(0x7f0000000440)="00000000003a13fc2dcbcb52") ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f00000000c0)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)="00000000003a13fc2dcbcb52") bind$alg(0xffffffffffffffff, &(0x7f0000000280)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) dup2(r0, 0xffffffffffffffff) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r7, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") memfd_create(&(0x7f0000000000)="000000000010000000004300000000", 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:38:44 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sed\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") rmdir(&(0x7f0000000180)='./file0\x00') [ 894.118862] ceph: device name is missing path (no : separator in /dev/loop3) 03:38:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x94}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:38:44 executing program 3: getrandom(&(0x7f0000000040)=""/148, 0xfffffffffffffd2b, 0x3) memfd_create(&(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000040)=',vmnet1%vmnet0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941b5a30f7f7f37525f469c0f389c0f3844c19086d962788f660f3800bbd5000000197a0779fbc463fd7998b400ba000079aaff43d0e1460f31010d64ac1e5d31a314b706e205c4c1fa2d680d7b7f") [ 894.370071] ceph: device name is missing path (no : separator in /dev/loop4) 03:38:44 executing program 0: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:44 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0xfffffeb1) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x94}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) 03:38:44 executing program 4: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:44 executing program 5: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:44 executing program 3: getrandom(&(0x7f0000000040)=""/148, 0xfffffffffffffd2b, 0x3) memfd_create(&(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000040)=',vmnet1%vmnet0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941b5a30f7f7f37525f469c0f389c0f3844c19086d962788f660f3800bbd5000000197a0779fbc463fd7998b400ba000079aaff43d0e1460f31010d64ac1e5d31a314b706e205c4c1fa2d680d7b7f") 03:38:45 executing program 3: getrandom(&(0x7f0000000040)=""/148, 0xfffffffffffffd2b, 0x3) memfd_create(&(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000040)=',vmnet1%vmnet0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941b5a30f7f7f37525f469c0f389c0f3844c19086d962788f660f3800bbd5000000197a0779fbc463fd7998b400ba000079aaff43d0e1460f31010d64ac1e5d31a314b706e205c4c1fa2d680d7b7f") 03:38:45 executing program 0: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:45 executing program 2: keyctl$set_reqkey_keyring(0x17, 0xffffffffffffffff) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') dup(0xffffffffffffff9c) accept(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000380), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280), 0xc) socket$pppoe(0x18, 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080), 0xa) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:38:45 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sed\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") rmdir(&(0x7f0000000180)='./file0\x00') 03:38:45 executing program 3: getrandom(&(0x7f0000000040)=""/148, 0xfffffffffffffd2b, 0x3) memfd_create(&(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000040)=',vmnet1%vmnet0\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941b5a30f7f7f37525f469c0f389c0f3844c19086d962788f660f3800bbd5000000197a0779fbc463fd7998b400ba000079aaff43d0e1460f31010d64ac1e5d31a314b706e205c4c1fa2d680d7b7f") 03:38:45 executing program 3: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:45 executing program 4: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:45 executing program 5: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:46 executing program 0: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:46 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sed\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") rmdir(&(0x7f0000000180)='./file0\x00') 03:38:46 executing program 2: keyctl$set_reqkey_keyring(0x17, 0xffffffffffffffff) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') dup(0xffffffffffffff9c) accept(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000380), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280), 0xc) socket$pppoe(0x18, 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080), 0xa) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:38:46 executing program 3: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:46 executing program 5: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:46 executing program 4: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:47 executing program 0: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:47 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sed\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") rmdir(&(0x7f0000000180)='./file0\x00') 03:38:47 executing program 3: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:47 executing program 2: keyctl$set_reqkey_keyring(0x17, 0xffffffffffffffff) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') dup(0xffffffffffffff9c) accept(0xffffffffffffff9c, &(0x7f0000000400)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000480)=0x80) openat$autofs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/autofs\x00', 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000580)='/dev/vcsa#\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000380), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000280), 0xc) socket$pppoe(0x18, 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000080), 0xa) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000bc0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000c00)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) getresuid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) 03:38:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) 03:38:47 executing program 4: r0 = inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f00000004c0)=[{r0}], 0x1, 0x7) [ 897.576244] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:47 executing program 0: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) [ 897.631336] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:48 executing program 4: r0 = inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f00000004c0)=[{r0}], 0x1, 0x7) 03:38:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) 03:38:48 executing program 4: r0 = inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f00000004c0)=[{r0}], 0x1, 0x7) [ 897.903523] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:48 executing program 1: syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0xfffffffffffffcc1) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f00000001c0)=0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000640)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000680)) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000015c0)) geteuid() lstat(&(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)) getuid() lstat(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) geteuid() getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@mcast1, @in6}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000001e00)=0xe8) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f00)={{{@in=@multicast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000002000)=0xe8) lstat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) getuid() getegid() stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)) getresgid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)) geteuid() stat(&(0x7f0000005600)='./file0\x00', &(0x7f0000005640)) stat(&(0x7f00000056c0)='./file0\x00', &(0x7f0000005700)) [ 897.965876] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:48 executing program 4: r0 = inotify_init() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f00000004c0)=[{r0}], 0x1, 0x7) 03:38:48 executing program 0: socket$inet(0x10, 0x0, 0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001440)) tkill(0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x730000}, 0x200000}) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) 03:38:48 executing program 3: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000004240)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:38:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) [ 898.246751] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 898.255537] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:38:48 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000002c0)) 03:38:48 executing program 3: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000004240)=ANY=[@ANYBLOB="ec2900003000000826bd7000fddbdf250001ec00801001007c10140000000c000100736b626564697400640002000800050001000000080005000000000008000300000008000800070000000000080003000300ffff080007000600000008000500070000000800070007000000180002000101000004000000060000000400000000000000080003000600f1ff04100600b9b0b0210dc0dc7afecfc994ffac3b2a0428a540fc6572e7a6553dd5827da6457a29ce2f51de9bf6c18dab3716148592842afe9e240d26104e012ffb9eb2ffc836a9b04d04a985b5ae8cb8406f8334524a768bb47df060121afb7884f819ed9c102fa7c406d952f5516c72c9e212fe1598947b02af8f273c49ff85b2e9f599c5f5510d63a473844c1d1d6f9ddffcdd879984d0bbb71db65b2ffd404d69b81049c8c1e87c42d6054c17884044cff1f65f8082b72b354d997fb7380959999119d0cb2805caace97c7d82674c29641ef324df1ca457fecf48df6796a106586918b23447f957d0922bb78f440650f2945e6fb70e15f568beeef49fe4472abd84bd9c19447480d30fbc56581a11c2ba5360d33ebce680a147dc40fd8385bb50d5159e378a3e6a294d862b9a75d6a814176fae22a338826741d74774fd0ff8998a612e05340f72260648e8a0d6cdf5f8b462d5adb9b0dbc6e16bcd4c531ec07797604f007099b24d2d367c6f228386ee89ace7bc831831372b65c5810e0b2b5d59c6df853b16da65ef010bf7e7c88fe0e8aaf405882b1c03118a30387a137c3d9265f5c744c64e99012e720485c751114006bb2f212d371c14d0314994d4b22126214289dea9beeb913fbfa5b4cb63b9fc1345f8d419ecff57ded4d0cbd28916e74e4d8590a7c6b3971fc6814a5d473f3523fde474f6a2877c10ad15d0a0c4eca4f0cd72421a85c3b027d406788bc0249132c74a8abc0e95c0c106a7c1b2c0eb8ba54602bc6d176d1afa2f7a6ffe643f31b3c17497099447054a321d7f831a7eeae3b1cb1c51f44210ce9b0afaffa41e884b12e97be569daf187149c497a53f1d5a61b865edbbd9ca25c6a9d15e81e6cb2c16578a5b09617c015dcd2acf7060394ce26108ab26910d22227522c46223fe3eb4b0a84d93ae78b00500c27e26641e0b1e19db5d62fc588c739bcf1bb820072e4af6c52f8433ef913486d7d0abf6affdd16ead7e534106f0a219dbb5db7c41f3cbad605e0594d12ce89bf2a67b45853c109960638bd6083a4fcf14069b285f46fe7d1564c5ee469f24ec4c197c7ff507eebbfcdf039798cc8283656156fb6e3047150296d50d25d2fdf0d0fd224513e62fef0505569f8123d446ef4ea16dedfb08563a7136ce6b6f962c51c7657cd58e3e8096eefda2672bcda7724d076afdc5a9ac0e111b9b330046d805125bc28dc2564565dfbb9789647e02ead0c35a751a8e4d86cde7d0578e359ee22d139f38151f9efb70fd9e49eebaf52a8550b1d7242f0c9480c1aabe71996256224dfada012f17f1af6ff413073a126da1cdb1aa4b65e9b4e919c113156138ddbb1321a61c1e51f050546717576836bf103f84916e6999a03081d6076348b30a9e6bb118bffc1f5ecdf45484f1dc57087b9479d0347c792c2223bcfebb3dc7605bda744eae9372c98a4e55f12dbf7d48b13a808050bae0ded040d4d49be12bc0b093696d7268d4ffae758e1111dd494d9728b2165835ad3093c54c0d6e60d0f407d01fe2d2c35160a6ec703057d7aac2364b58cf056c85c001077563720d2ab17e8bc1b9faaccddda66d569db050be60b12494e5aa370ee126c917a3a9cefa1e16df7c04c98aaa145844c9700a85ec9ed86116aa743c691f94b57de2fd1082ed6c3d3f600240e0d1b3d4f2a7983249124064368f8b3fb6c6583d0f1c84410eaa12d0db0c1c03cbd760c2e3e6d9cf32975f91de4dcc6398acf9c1d068652493063f7078c173df6244d6d18f0829d87b876cc269efcd70946ce27c7d1489f2aed53eefb284ee4e57d68f2e8c4962470ce3287bd19299a568924dce3df735b4975de4b7da8e51cf685f221157c576b5cce1ac2ce55d291fd932f54356bb09bdcfffb8ecbdee36f1a600bc79cd765d2d74d79f203f56e15fe8b62695230f654423c44ea63060bdc15954d3989031f605628c0879fa02010fbf64a2b393299ba121ab8306487b05894c0447c64a3b77e0ae38cf74cd670d2fc52b5b26b0391626d7b3f4454694d904c3481d371c99a09482dfe4d72b0509be5f01ed5f07f2fe70376b6e12e1f8e5d0959681ffc6739a873bdf7d6d45f58a698a99bf412a722c78b16faaeed9f36d5b5f09aa980bbf135a4f1856e157acf08073e316818000919c2e9dc5679c7b1ee56243cce68f844e9c604092e09a0dead80340e04031a1aaab24b7f64a21fda0eb95b8e6b4d5956f6c63b79d694948e7fb6fa8e10818bb1e29b05b5d6d459559486e973759d8489750b64b8422bcf25aa02dc834697888b4249dc0b2037eedfa541963048c8640cee28ce4fedf26911b9e902995b86d3c2311c6232f61d77c6ae60f6dea30c4b506e4eeb8d4351c90a0b2b9dfd983d3b8ac48e4b618df67903a6e806c07cb571800b0e90dff5d045bf15ed4c45f82aa9ea6cb46016bb69125b1c78c056f33fcb843acd0e88002f88c3fe4b1cc5fa993603284a542bee9721f80348de2ee88b124f8191789d0b1895e2fc66af3cf187af8dfa647ab45865169ede15237b809391832eaae6ef20bf717aac5abca70dbf313c55d4673216decb601a6af7403c4371b70dd427459d497ee5149989f8ac71d3ab9f2729338063acd284a30367a7000328389a12d1db75d1305fda55113a46e623b3625f52b46a7ab40b276ace6c0b2dacfc107b64c83a6088352f667214283cbf56630619cd95d885083fdc23afd8de3e1e003725004cef09c3418f4a130ebce62d6d497959213439256c37659a70a20e6112073e6483648f01324b7012adabc5c348527b42fbdb21d4aa3b85cffc4909409575e8b55c89235612c3eb9026d8859755853eec87e0e157be90982a9e50b50e0cd64c78c508f3f455fd9099eb1d74bdfcd0bcf17566252f31e782adbb22b9c82709b6b284ce33f86b00c27886a461c81d404dcf8305c3dba474f9d9b012cb3e06763772f9c406eb53e466394223ced6333c7f539b053332786763084f90ac9849fa33b4d9c3d46b7fa70a1ceb2177694ba326bf8783162479338bcfe9b86c8e5b544928343f356fd28625d85e4790e006e8146e4191bed1bf6d7e338692dcddae6223573c02ceeca53a89c1da24b50df95aa18390adb405e7979832f191268ba52847de3b01ef7efc22fbe5573e1d287552630ad09863943977ba99ed91983f6dac0d950bd744960ca2be7b26a3c86b062d2337834cf067f7db7746d382e2c98fb692eb0df5bc28d5652815435a6d6343f2c8aedcfb1679460a6c28834edbc58d36347b137c76dfac57a58f6d373e1f313964d22b442527373784fd46952c61f8a6034b1aa0cbbd75db782123043ebad6286e3abad7f2ef776533e7cabac1daefc81f7bba4a4125ba28f55e6dca4505fd5f9911c9fc3f55ff112b38c7d1109828bd1dd21a442b23e4aa6fe0a451ea836c27b464932b8072b3443d33ac868d2d2984cd2907cb8a6a4393181e5aafc55d415a34a7fb3f6a75eca863c15cedf69182ca8b005ee5bfef4bcdbb4b9551e4daf61fdc5305a6d05b892acff7f5d3a3e662d5da9939360b77bd753710fdf4ab65d4453115d5e7fbf36eeae1dc7b5ec9c8b7f536e67813970476b4c1a4b41dfc3cebc3f0b758445a569878738a284b98d1e7a781cae1286b2827f1cf2f71d5c91ec0685709264e0146dbf660e625e21ff37bba5cbbe5ee2fb54e10bc1b52cbd419e9d8875b0aaa38f55bc591862df951b780de1c6390b7688bdb94daf1e49b76b24f55ee4eada2cdefe1dce1cb86d0926c0eb4121ddffdf5ab55c18ab2dc28992ed8768ca1d8dd1fcf98dd8420f3708ff0f9a499ad289a16d3561a7e7f577b5cc069a8d8692f3bfd02d1a69c68af06470e57740e0d6bd0abe91df6c44ee2d4564134a98a138474093922d69da50302df402e3f4810923b16a3e2ae022d3f86b3aace77441c2bf708cae43ca8bda2dad259c8f89d6d18a3d3a02ef7acbc01316bc2235979c6942c187e9b0ee7b335daa8a26433a22cb947c25679945dcbc946730d244bb2526244bda4a0e18bbdc10a1537cacefe62e16ae50ee89a718789ed4e25219ef1df08d6562790c556909e359563cf7bc49551c7d30e5b83dbd4e09b5d94a9488df95ea631ae9547bd5d3fbf6104e884d101ca23827946866c4f02c4efc4a673863d6205252ce2dabfd047098a92d4dcc1a741a49b95ab10fea824322b661968df53851a898e398a01493a18554c88892493b37061b72bc7050933f40b456ef185d80aaa25aafb482f8b20f36c7ffe527ca457af98ede492b642f6ee854c67e3a3db3c13aecae71fe2aeb3cdb3dc2f9ca04be7b5614b5efd5a036d683713b3fca098ad8218c04992b908aaf7c3ee8daf5ad7ac531b634c56597d041ab59fc14086a8d28aa34c80488c539e6c2cd6e3fee4eb886dbb7a1ad7f188b16c70ea7dfce3d34adc5e53f9ca77ede553b6061b578569f29fdaccdc51690bad9b718027bf331cd9ab1d6c86ce0e0320786c453c2a136e21cacf59a065772e3209de226c408df750cc695e6fa76d913221b86a7e022e6c2c91ba733c9ff6119c1b22736a5c38cc527a99f65a3c962ca276e9ab4435cb700beda66522137be5e4b1caa5a177d7d135816042940d928bdac6611af9800f65d6ff567a6c85fb0cb4ba2244f58bf35481777f30cb68b2aab286de7ef00091cb7553e605e4669f392a108d1d850706cf87e5b833f1fa660909b5778f88c20a0b68596c35b70de19bdc0139f89817c2de4cb68c3e3ae9fc5d7fe45ae4de0a5119e4e92d86fb8375ccd95217fb4d271b0fe29138a0b6c395946284c538e21a6afc761e7d8c4ba587781f5115d960951d1a960a1d76dac4059fe6563dd6b3caebed649c029700e399d74994869190ee7d75b2df6f703a2b2238394840a9f06ba36e6235da52f8e12ff77e8047d9096fe1364382b94a38932f9447317ff1ef2ff289932588f47a361177c7ff0b92f3d22e2a173d9c3caddf70bba546b5b3297379a2f5b7faa7c8005c9450c98a078d80bd716afb2c38552b5642153e4cf721b73234f91c0c2a40c910d6dcdeecf8e6d05316e6ffe12090e6afd951805c16a6a99ab940e89ce3faf70499fd15fae5800d9b14b68e04677ee699018f4880374b14bb1a8ee5a470d0f12cf24b0430c1c882e58d2c92b315a5dd3229998c2f4698ed7303c544dc969d10c602fd9a98793482b3177e8fdec61f04ad3170e23fa388ba6cca6db26e69cd344109ba9bf5ff163972be7808e883df8d373844766a698f75d906e36e5a89482cb4d4a5a932bda5d43fee4bc089d31d70ce144a348762308ed9d4d51d4e959ca29edc30b9b1a7b1234bcc34b1910fc3883931f0344547bd064050f4e6963ca1240ea3c4846822f4b76ac96f5f156a4e36918eb608340809bcede903256f68d74b3df25e38b2b753598384af92136767d7f6b34dc589312db2405f048d6403330ccc938a1c25fe8d7e7bd03aa02b31f18d83de5f5f2ff4668f7372140c0970ed79f24ebcb18d76c23e693d910d156fd9829bdf792a8321c2594e5be01398987b45165c3a27a9b44e9ebdfae87d77ce91031ad0b87429203c3e8e1b70ebc496d400a08a32a9dbd8ba4b99b980faf0a853c992c1ed147fd409685256a7a68ee4065559108b5b72b790ab84bc971b0e104cddc017596ae115d70fd0b50cc84dd479a4e8ed655f0ee7f74ea870dff3942959a14285326d8f65719c10b068374892f35d6083c676c5d5363a7cf32f6357d067c45d47eb042d588d9826cdfe4ab10e4c7d2d100ffee23e78ebf3306cbc0000cc000100c8001d0000000800010062706600400002001c00040009000001000000000300070403000000ff0300ff0200000014000400ffff0004000200000100ff09000000000c0004000100ff02080000007800060053427c6e022fd3b3e126ec7665279e246bc0997fbcdec61ed64756eff57fe95bbb34c1387ff39dbaa20ba503ae4a0073b2ac2112e0bdb1f1e315978a274e44eb8e6dd927d558d0a50397a1641816224d5d615e9babfc20286da69ee45b89b951ba28202a96a4fa30e0554b10405f6289ec9ffc1c00008c1801008818020000000c000100706f6c6963650000700802000800040081000000080004001f000000040403000900000002000000020000000700000003000000e30000000300000004000000000100000080000000040000ff0100000000008001000000050000000000008009000000900a00001300000000000000ff030000010001000400000005000000d04d000002000000ff03000002000000010000000200000081000000feffffff070000000900000008000000ffffffff080000000200000000000000050000000400000001000000ed3a0000ab970000070000000200000001010000010000004241000020ab5f5300000100750100000800000000000000ff010000380a0000dd000000040000004d4c00000100000000100000070000000500000002000000002001000600000007000000090000000100000069870000cf0000000500000009000000ffffffff0700000004000000ff03000008000000ffffffff5a120000070000000800000006000000090000000700000016040000000000e0020000000800000075030000ffffff7f080000000100000002000000cf006d3404000000000000000800000008000000070000008100000001feffff01010000cecc00000100000007000000497c000004000000010000008a210000ff0100000400000003000000240200007f000000000007000000060000000008000062f3ffff1f0000000500000000000000070000007f0000007f0000000600000008000000000000a0010000000800000000100000010100000900000008000000f2000000fe0000000600000000000000000000002d00000064ffffff000400000500000078000000f7ffffff0100000000000000650000000600000069280000000800000000000003000000000001000600000007000000070000000700000000000000f8ffffff00000000020000000500000007000000060000000800000001010000fbcf245d0010000008000000db000000ffffffff00000000080000007f00000006000000060000000700000000000000080000000900000006000000010000000180000004000000feffffff00000000ff7f00000800000000020000000800000200000080000000ff01000000020000c532fffff9ffffff01000000000100000000000000044000de05000008000000ff0f0000f8c30000ff0700000008000006000000870000000600000000040000050000000100010007000000020000000100000040000000ff0700000700000068000000070000000400000001000000090000000002000011030000000200000000000002000000260600000500000003000000000100000100000007000000ff03000003000000ff0100002e02000057000000a56b000007000000010400000900000007000000030000000008000001000000f5340000fdffffff060000007f0000000100000080ea4d93f8ffffff04040200ff7f000000000000e0890000070000000000000001000000bb00000000000000030000000000000009000000530000000500000006000000018000000700000047090000abb80000d99f0000010100000500000009000000b7000000ffffffff0100000008000000ff0000000100000008000000030000000180000007000000000000000900000000010000575100000300000000000000d4ffffff0500000000080000cb000000af040000030000000200000000000000010000000400000070050000ffffff7f01000000feffffff01040000030000005692000007000000000200003596000008000000040000000700000000000000ed0b000003000000050000000600000004000000000000000500000001000000bf0d00000100000020000000e1ffffff020000000000000009000000f7ffffff070000000100008008000000fb0e0000ff7f0000040000000200000005000000fdffffff00000000fdffffffffffffff070000000900000003000000cb0e000000000000d858a419018000000600000006000000810000000100000020000000bd000000f7ffffffff010000ee5400004a1e000000000000030000000101000009000000fda6000003000000fcffffff8c050000fdffffff00000000e90000000100000008000000080000000200000002000000010000000000000006000000ffffff7f5a10d92f090000000500000045ed000000040000ffffff7f0200000008000000b800000000100000060000000700000006000000040000000600000002000000010000000000000000000000ff00000000000000feffffff46c700000300000068ae0000070000006d00000019050000ff07000001800000010000000080000009000000e9020000e2cf00000000000000000000ffffff7f02000000fdffffff46690000e10000000900000007000000000000000500000007000000090000000500000016070000010000000000000020000000c7000000ff0f00000200000003000000000100001f000000fa020000010000006667000000f0ffff2b00000000000000fcffffff280000000200000000000000010000006007000001000000d10f000009000000020000001d95714f030000000001000005000000000000000100000003000000010000000300000001000100ff07000049000000b9000000cf000000020000000000000009000000010000000400000002000000090000000200000001000000400000000800000000000000008000000600000000000000030000000300000008000000080000005d05000003000000686e00000004000003000000010000800100000006000000010000000700000003000000040000007602000000000400c3c500007f00000080000000090000003c000100050000000200001004000000f9ffffff7f000000000200000700000007000000010105000200000002000000b6000000400000007f000000080004000400000008000400aa000000080004000000000004100600de7e7d0e329b4ef2cf58489950b2c26f2e9a24c7b02891306d64c79c8ae1e17c6706158a9092a4880091d0425cdee88f58aa11acd2be3ce7a7876085e33c56f23de4574f1ae996a6e49d36f33dd2b72282416bc6cc5b83ab9972a06e311ce095e1f30552e553fa23a777c0bd4f6144606e16ef09e8be259cf398c566093539a67975a2d948da639f85e53bdeef8437ff2a12ec97abf6721edbe3566c29282bd306e33ff9e912474f5524d2f48afb9410ff41a3f535d1a5dd3916f4b59d71fadce46776ba9378d602ef0a182e4a6b7bf369e86ccfa375025a1d81eb63e720f614c1f78ebb4c0a3650e74764e21d340c1d9c2497a2d5f1e4c83c11311cbdd20b27cd5f16f0f88b8c4bc13d4d75ed0f788d21420d0fe7bebc01cdb4717ab9a5a1cc92465f0eaba930ae4415c8aa85b3aff9a8e916ffe4ee587e4c95425f740c8ca0dee601e7b44364ad9514ba54398bf2c2379b6e9c3049d8762180e820abdca0c7d11b72bc2e5439df37e91c70bf609f2a1a4f50888b557960378e564a23439c9f82582dfa92f3905379458028744887cf0f76eea3d5887bff3f4494061a006eb3ef510710892a8aa74eb61b9b89da14d21384d7853271785f648974aaf7a20fab55d4ad69794e5bae5e2b6b67218b7004bc22ad1a2a5f45ac193c27417883ee8d1b49cb90fa604a2ae8ec752a3f68b5c41976ad5cca6883093823ccfb6ca1cb25fdfc5b90069bc721d294e77952794063a099d276b3d6906a46eb75fe43e269f847b4402f820618097813c1dfd4add9c496d05b3ee354a16fca6e7a2e931b55dfd6d1fe1d277d4bf245108930610b276c3be0c7772b2608bfa3c67fd3ccd844d140b5aaa1387f3ba8ce691939d36e4ccf61f6e222e4bf84a743ff86a652a0dd07312fd9e11a30dd79f108d0b3290cd2f54a9304ffb8cedb38dad9cb6364cb3bc4b467c5088c6c2e5f9d7637d2d8d222f0f45a17d36c0dd52319ef244cb8696ff6c518d7bdd82d941fd72447c40b3c037ec144de96289feb4f472492759d5b32e97a5ffbf6f58dffcb925a1b16c6af82189f08e076866d7f260e3e599e536b3bbca7586f966e11b7d82e0a1856f601b2cb67a0f19062ab790137c74985ea4d5524ca165466ef8ad97f755e1abf6abfd6d3e1b384e3a58461358a6477a800cbc29abb258ca8481aa589b62f5097639f38f2046d73d40e0b468704762d46036c33f5cc51d1c003b772c9fcf03c6ce3456666134ec4915ff480085c40e3d2de743ade15c1048ecc156ec8bc0baa0b5a019985f1472ebdcf73af2a0f336745bfb6adb1db4c7bb9421d7c714c942d04ef568e725f2203f65165e24fdf8696e3ae7999f40c66174627a6ec0d0d355fe4ad57948a4516a06312518dccad2d6e6b07a8db85d6ee3f708ab9f26494c84c07bd242a41606802d17e708c3f0f276135173463726aa7196aa11014cedc29dae279673d4e407fdda208e6711c61a2b50ff905ac07a0150a6bdebd5ad82ca32f6b105a51114777317ec63537f8bb9ca09243584cf11dac437e44efae4922008fb610b58fdb1169815610cb24ddac832abd392ec536ee5ffe7970d52c191cebef7fbf43cfd38f9fc784969322b8b571ef7f4e4d3dad1b547d469777fdf91c1d20b880b838d1af71ffe7e36d843837363a3d26afe16f56f064563b1a66f53b9864c950e722e891a2c3a7df4adc1f37cb68fadd3427cf270ac33b758d0db1b8f9bf6951fb49faeaef89fb06ac4d300c93dcb1848a5fc5b91ff7bb93f0cb7fd57ee19877d99e2619daedf73e65f1cd3d5f2cb1d2f8e8dfa825708f3daccf2ab547f93a073a2557cd817b857777342ebd0176934ce95e0367173cb5cf9d064840a966c14bfc836e4c7eab320bc90ca2fcbf18ccc64344cb70426e260bc501c953d7b36742c671ecfafd23caecc415bd887b9fe2224c71373480fff068c8a452e8c4d921beebfa2cd7e0ef6025e9d664e06671dacd15689aeae306b70e70139717cf315a3e24201f609f3723cbf9ad885e93c620834353f4f63b19470288f73b6788ce9ddc5fa1e5ddc9c4726181a26a6b68df683683dcee396262c75f5214d81074384b3f439a3b1dec9b2330f5956af19ccc9ede8cda5fbcef7d551174750a3bb69f36b31e10500de8dcc62f431bdbb33cc3a14e248a797295933015bad63e616b641b07606b4801ac1bc2f420fbafb14b2ba8b3a02e32bee4c7a32b648542641ce524eae073a419087a4e075d69b476af146d6a27825a5d8cee35ebfe2da16a49c6d6f1f184a4337314ec97980411f0b40dca9ba538db931368c5db0092f2e7635d184a5f9bb2b6112208d7dae406f49dd3d3276bf39a41e24cce1d7fc203070fd181351f27b0121b62ccec4569ce34b86274b28a163dcba41e7c127942d088ed4ad7d5131f645d78922a132666a3be924507cca1969045db4334488e9bbe565be79fac05566c8e01e7f95b810bc94a00f387987df1b58f9b33339b2eefb28812554d56165e89d0bbd661c396adac4076f4c5e6948e6640723e18e19538567417061488710d1c1b363c737bf1da0e0aca6641502f2f9353c5e7914f01d1b4a970b57da3fd9b192147e0cd50799492d540ce6aaf4aa62cc310c40e3fd2dc3e3257488c47084d9b344b842d9bdccb6b0197fa99cfdad02cc9a402529867c3ba58eaee1404c1fd065d0f98df3c0f2e4ff35df6aa01a96302c9f3c7f1a5de2325af5a5e1ed0abda4019ed1457982a22bfc31fdc98c479ea98f280426e92ed0fbca6e71fa43a2476113bef6f0a402837cb4b27d06c23474b53e45d69faf2b7784e6798b304f3c7ce6e71353c681e1ff27b24c735b5b414a0405094b8f6696e1923987b5a31acb99c5154c7befe2c48b64d454e32d990a90b55c4ea03d9e9bad214350f13d025887a6c3005e4a09a8400a4be537f3c976560467f7dfd9bc58fcaeb824215a685ea6b4d7feee81886e56cc351750f930a7d5c58089f9df241c583d04974778189bf9bb415a0d7f3525aad8f7bf6f896b0d181c031c87b99e7721b2dd765b202fa3a23d2d9e567f672941674058492a2b533f3bbeb24b3c443c252926cd982e18a744d7c0b4442ce4f0f929ad5c3c8c946520537cc07220055c6cb8c0989f6cd8a491d1e0b076cd90797fe0071b3b2bb4a73000a24a3b44a0bd21a1e2fa93f1bccbff90165076541d5d7bd6dec3b6cda70e6620f50bd0359e8e123fa8bf6496ad4dcc4b25cb260a53cd23d4ddbfbf00dbcc3f768f67243d1786f183f3b902508ecb00d68ce561417ff505e90a77b16df72bb18c04873392d2f354356ffa5f32b42eed1ee486777591dd15914ec76c9ae23769ffae8b32283467697f4d5a6c266aa68062d13df006188ee72c3463d3a5d161825dc2654b9b9888ab022a7820b8108beee9cf66d3cf78ac28025f73da703322ace7697c076b6f84348bfe5bb01369f514d1503cbf1033dd85427d33b43312b31a1118dcf5381a12b4ec5f21d4f0fd193ee39825034bedd2131cc230422c5a85b76e7c30d590540ca5157ea60c8b77c47795d19bc83f15a3a220e7c255340c42fc2c3f52cf90b1ff9fd6dc84b5a3c854a267bfd64159b840aa0e61a688f0ee4bf74b7329e21f2934b8ee335fb9f2a3233d43257657c83f9af3b64670bfc494f3803f2c6375107cf789ec5295a7f09a6402a8af584db584c22b1681e355ba840e22f2182015de0c736f4f29046a87568c0c8f4c1a6b14fccfdc3dd420780530fb5becb1717b8ea1c5a03a8d3590e60e5918455e10bf4533e892f6e7527bea3e768056e1af409018754ae03670de32ded9d774d6580d8fd9c64069a35f44e0cb3fba956b5a1be33c9c0a89d9c4bbdccf0c6e6b6b265c2a5db"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:38:48 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:38:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) 03:38:48 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000002c0)) 03:38:48 executing program 3: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000004240)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) [ 898.499204] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. [ 898.520607] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:48 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000002c0)) 03:38:48 executing program 3: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed0000464caeedf840d001fe92b08c3f7b8e1596417d7dcd645413be450000000000000001c122283846253398a04d99ca8680deb20632834bc027c44d4cf3fd102724d6748de61eebb06801048dea7636f3a248a9bf3123882ca9fc66b4e70b06d43045", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000004240)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0x14) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:38:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x10000030}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) socket$packet(0x11, 0x2, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x1a) 03:38:49 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000380)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) r2 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000002c0)) 03:38:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$sock_void(r0, 0x1, 0x0, 0xa0700000000000, 0x1900) 03:38:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:38:49 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000700)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f0000000d40)) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getpid() stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001140)) fstat(0xffffffffffffffff, &(0x7f0000001180)) getgroups(0x0, &(0x7f0000001200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b80)={{{@in6=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002cc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d00)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002f00), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000180)) open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$sock_void(r0, 0x1, 0x0, 0xa0700000000000, 0x1900) 03:38:49 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:38:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x10000030}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) socket$packet(0x11, 0x2, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x1a) 03:38:49 executing program 4: prctl$setname(0xd, &(0x7f0000000380)='/dev/midi#\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000980)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000009c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000007c0)={0x0, &(0x7f0000000780)}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000900)={0x0, 0x3ffffffffffffe22, &(0x7f0000000800), &(0x7f0000000840), 0x0, 0x17b, 0x0, &(0x7f0000000880), &(0x7f00000008c0)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) getpgid(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000940)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) syz_open_dev$midi(&(0x7f0000000a80)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000600)) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000440)=@assoc_value, &(0x7f0000000540)=0x8) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000a00)) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000680), 0x8) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) 03:38:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$sock_void(r0, 0x1, 0x0, 0xa0700000000000, 0x1900) 03:38:49 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$sock_void(r0, 0x1, 0x0, 0xa0700000000000, 0x1900) 03:38:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x10000030}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) socket$packet(0x11, 0x2, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x1a) 03:38:49 executing program 3: mincore(&(0x7f0000ff9000/0x2000)=nil, 0x2000, &(0x7f0000000c00)=""/165) epoll_create(0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) geteuid() geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) geteuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@multicast2, @in=@local}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000000cc0)=@nl=@proc, &(0x7f0000000400)=0x80) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f00000021c0)='system.posix_acl_default\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000640)=""/223) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000002500)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:49 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, &(0x7f0000000280), 0x10000030}}], 0x1, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) socket$packet(0x11, 0x2, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x1a) 03:38:50 executing program 5: clock_gettime(0xfffffffffffffffc, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:38:50 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000700)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f0000000d40)) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getpid() stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001140)) fstat(0xffffffffffffffff, &(0x7f0000001180)) getgroups(0x0, &(0x7f0000001200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b80)={{{@in6=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002cc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d00)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002f00), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000180)) open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:50 executing program 4: prctl$setname(0xd, &(0x7f0000000380)='/dev/midi#\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000980)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000009c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000007c0)={0x0, &(0x7f0000000780)}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000900)={0x0, 0x3ffffffffffffe22, &(0x7f0000000800), &(0x7f0000000840), 0x0, 0x17b, 0x0, &(0x7f0000000880), &(0x7f00000008c0)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) getpgid(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000940)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) syz_open_dev$midi(&(0x7f0000000a80)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000600)) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000440)=@assoc_value, &(0x7f0000000540)=0x8) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000a00)) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000680), 0x8) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) 03:38:50 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:38:51 executing program 5: clock_gettime(0xfffffffffffffffc, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:38:51 executing program 3: mincore(&(0x7f0000ff9000/0x2000)=nil, 0x2000, &(0x7f0000000c00)=""/165) epoll_create(0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) geteuid() geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) geteuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@multicast2, @in=@local}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000000cc0)=@nl=@proc, &(0x7f0000000400)=0x80) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f00000021c0)='system.posix_acl_default\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000640)=""/223) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000002500)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:51 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000700)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f0000000d40)) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getpid() stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001140)) fstat(0xffffffffffffffff, &(0x7f0000001180)) getgroups(0x0, &(0x7f0000001200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b80)={{{@in6=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002cc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d00)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002f00), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000180)) open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:51 executing program 4: prctl$setname(0xd, &(0x7f0000000380)='/dev/midi#\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000980)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000009c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000007c0)={0x0, &(0x7f0000000780)}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000900)={0x0, 0x3ffffffffffffe22, &(0x7f0000000800), &(0x7f0000000840), 0x0, 0x17b, 0x0, &(0x7f0000000880), &(0x7f00000008c0)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) getpgid(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000940)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) syz_open_dev$midi(&(0x7f0000000a80)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000600)) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000440)=@assoc_value, &(0x7f0000000540)=0x8) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000a00)) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000680), 0x8) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) 03:38:51 executing program 1: keyctl$set_reqkey_keyring(0x3, 0xfffffffa) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000200), &(0x7f0000000240)=0x4) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=@known='security.ima\x00', &(0x7f0000000300)=""/202, 0xca) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) 03:38:51 executing program 5: clock_gettime(0xfffffffffffffffc, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:52 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) mknodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000700)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000cc0)) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f0000000d40)) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getpid() stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001140)) fstat(0xffffffffffffffff, &(0x7f0000001180)) getgroups(0x0, &(0x7f0000001200)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b80)={{{@in6=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002cc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d00)={{{@in=@loopback, @in6=@ipv4}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002f00), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000180)) open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x400) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000140)=""/145, &(0x7f0000000100)=0x6f) 03:38:52 executing program 4: prctl$setname(0xd, &(0x7f0000000380)='/dev/midi#\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000980)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f00000009c0)) openat$vcs(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000007c0)={0x0, &(0x7f0000000780)}) ioctl$DRM_IOCTL_DMA(0xffffffffffffffff, 0xc0406429, &(0x7f0000000900)={0x0, 0x3ffffffffffffe22, &(0x7f0000000800), &(0x7f0000000840), 0x0, 0x17b, 0x0, &(0x7f0000000880), &(0x7f00000008c0)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f00000003c0), 0xffffffffffffff7f, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) getpgid(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000940)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240)={0x0, @empty, 0x0, 0x0, 'lc\x00'}, 0x2c) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefac462fd1e28a676e541b87545d745d71ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f2ab7f") ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) syz_open_dev$midi(&(0x7f0000000a80)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000600)) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000400)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000440)=@assoc_value, &(0x7f0000000540)=0x8) syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000a00)) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000680), 0x8) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) 03:38:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x400) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000140)=""/145, &(0x7f0000000100)=0x6f) 03:38:52 executing program 1: alarm(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) geteuid() syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x400) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000140)=""/145, &(0x7f0000000100)=0x6f) 03:38:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") unshare(0x400) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000140)=""/145, &(0x7f0000000100)=0x6f) 03:38:53 executing program 3: mincore(&(0x7f0000ff9000/0x2000)=nil, 0x2000, &(0x7f0000000c00)=""/165) epoll_create(0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) geteuid() geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) geteuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@multicast2, @in=@local}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000000cc0)=@nl=@proc, &(0x7f0000000400)=0x80) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f00000021c0)='system.posix_acl_default\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000640)=""/223) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000002500)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:53 executing program 5: clock_gettime(0xfffffffffffffffc, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:53 executing program 2: socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000fd9ff0)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f0000000840)=@hci, 0x80, &(0x7f0000001b00), 0x0, &(0x7f0000001b80)=""/4096, 0x1000}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000fef000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/165) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$vsock_dgram(0x28, 0x2, 0x0) mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000005c0), &(0x7f0000000680)=0x4) socket$inet6(0xa, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000380)={@sco, {&(0x7f0000000200)=""/86, 0x56}, &(0x7f00000000c0)}, 0xa0) syz_execute_func(&(0x7f0000000600)="42805da0610fef69dc0fc201e5eee5eeff0faa0faab7490f38211ac443596b7b2306c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1a660fc4e37bc44379dfb9d6adbe90dfc4c3916efafe9f7f") ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000440)=ANY=[]) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:38:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x4c00}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x20, 0x32, 0x119, 0x0, 0x0, {0x1803}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @u32}]}]}, 0x20}}, 0x0) [ 902.951746] netlink: get zone limit has 4 unknown bytes 03:38:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x4c00}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x20, 0x32, 0x119, 0x0, 0x0, {0x1803}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @u32}]}]}, 0x20}}, 0x0) 03:38:53 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) seccomp(0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast2, @dev}, 0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) add_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffff9) clock_gettime(0x0, &(0x7f0000000540)) sysinfo(&(0x7f00000003c0)=""/81) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x280, 0x0, 0x280, 0x130, 0x130, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast1, @dev, [], [], 'tunl0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@dev, @mcast1, [], [], 'veth1_to_bond\x00', 'ifb0\x00'}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) getpgrp(0xffffffffffffffff) [ 903.068752] netlink: get zone limit has 4 unknown bytes 03:38:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x4c00}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x20, 0x32, 0x119, 0x0, 0x0, {0x1803}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @u32}]}]}, 0x20}}, 0x0) 03:38:53 executing program 1: alarm(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) geteuid() syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:53 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x4c00}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x20, 0x32, 0x119, 0x0, 0x0, {0x1803}, [@nested={0xc, 0x0, [@typed={0x8, 0x1, @u32}]}]}, 0x20}}, 0x0) [ 903.239289] netlink: get zone limit has 4 unknown bytes [ 903.332212] netlink: get zone limit has 4 unknown bytes 03:38:53 executing program 0: syz_emit_ethernet(0x2c, &(0x7f0000000400)={@dev, @remote, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@current, @current}, {@random, @random="fb465c2a8709"}}}}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) pipe(&(0x7f0000000700)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000740)={0x50}, 0x50) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) truncate(&(0x7f0000000480)='./file0\x00', 0x0) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000140)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) fchmod(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b880), 0x0, 0x0, 0x0) geteuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000340)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) getgroups(0x0, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:38:53 executing program 5: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:54 executing program 2: socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000fd9ff0)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f0000000840)=@hci, 0x80, &(0x7f0000001b00), 0x0, &(0x7f0000001b80)=""/4096, 0x1000}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000fef000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/165) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$vsock_dgram(0x28, 0x2, 0x0) mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000005c0), &(0x7f0000000680)=0x4) socket$inet6(0xa, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000380)={@sco, {&(0x7f0000000200)=""/86, 0x56}, &(0x7f00000000c0)}, 0xa0) syz_execute_func(&(0x7f0000000600)="42805da0610fef69dc0fc201e5eee5eeff0faa0faab7490f38211ac443596b7b2306c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1a660fc4e37bc44379dfb9d6adbe90dfc4c3916efafe9f7f") ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000440)=ANY=[]) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:38:54 executing program 3: mincore(&(0x7f0000ff9000/0x2000)=nil, 0x2000, &(0x7f0000000c00)=""/165) epoll_create(0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000080)={0x0, @speck128}) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) geteuid() geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) geteuid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@multicast2, @in=@local}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) getegid() accept(0xffffffffffffffff, &(0x7f0000000cc0)=@nl=@proc, &(0x7f0000000400)=0x80) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f00000021c0)='system.posix_acl_default\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002300), 0x0, 0x0) stat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000ac0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000b40)=ANY=[], 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000640)=""/223) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000300)) fstat(0xffffffffffffffff, &(0x7f0000002500)) syz_execute_func(&(0x7f0000000240)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:54 executing program 1: alarm(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) geteuid() syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:54 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) seccomp(0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast2, @dev}, 0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) add_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffff9) clock_gettime(0x0, &(0x7f0000000540)) sysinfo(&(0x7f00000003c0)=""/81) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x280, 0x0, 0x280, 0x130, 0x130, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast1, @dev, [], [], 'tunl0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@dev, @mcast1, [], [], 'veth1_to_bond\x00', 'ifb0\x00'}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) getpgrp(0xffffffffffffffff) 03:38:54 executing program 0: syz_emit_ethernet(0x2c, &(0x7f0000000400)={@dev, @remote, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@current, @current}, {@random, @random="fb465c2a8709"}}}}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) pipe(&(0x7f0000000700)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000740)={0x50}, 0x50) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) truncate(&(0x7f0000000480)='./file0\x00', 0x0) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000140)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) fchmod(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b880), 0x0, 0x0, 0x0) geteuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000340)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) getgroups(0x0, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:38:54 executing program 5: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:54 executing program 2: socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000fd9ff0)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f0000000840)=@hci, 0x80, &(0x7f0000001b00), 0x0, &(0x7f0000001b80)=""/4096, 0x1000}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000fef000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/165) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$vsock_dgram(0x28, 0x2, 0x0) mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000005c0), &(0x7f0000000680)=0x4) socket$inet6(0xa, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000380)={@sco, {&(0x7f0000000200)=""/86, 0x56}, &(0x7f00000000c0)}, 0xa0) syz_execute_func(&(0x7f0000000600)="42805da0610fef69dc0fc201e5eee5eeff0faa0faab7490f38211ac443596b7b2306c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1a660fc4e37bc44379dfb9d6adbe90dfc4c3916efafe9f7f") ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000440)=ANY=[]) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:38:55 executing program 1: alarm(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigreturn() openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) geteuid() syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:38:55 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) seccomp(0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast2, @dev}, 0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) add_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffff9) clock_gettime(0x0, &(0x7f0000000540)) sysinfo(&(0x7f00000003c0)=""/81) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x280, 0x0, 0x280, 0x130, 0x130, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast1, @dev, [], [], 'tunl0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@dev, @mcast1, [], [], 'veth1_to_bond\x00', 'ifb0\x00'}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) getpgrp(0xffffffffffffffff) 03:38:55 executing program 0: syz_emit_ethernet(0x2c, &(0x7f0000000400)={@dev, @remote, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@current, @current}, {@random, @random="fb465c2a8709"}}}}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) pipe(&(0x7f0000000700)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000740)={0x50}, 0x50) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) truncate(&(0x7f0000000480)='./file0\x00', 0x0) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000140)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) fchmod(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b880), 0x0, 0x0, 0x0) geteuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000340)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) getgroups(0x0, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:38:55 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xbc) 03:38:55 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xbc) 03:38:55 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xbc) 03:38:55 executing program 5: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:55 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0x400000000000003a, 0x0, &(0x7f0000261f44)=""/188, &(0x7f0000000000)=0xbc) 03:38:55 executing program 2: socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000fd9ff0)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f0000000840)=@hci, 0x80, &(0x7f0000001b00), 0x0, &(0x7f0000001b80)=""/4096, 0x1000}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) write$FUSE_POLL(0xffffffffffffffff, &(0x7f0000000280)={0x18}, 0x18) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000fef000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/165) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000580)={0x2, 0x0, @rand_addr}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$vsock_dgram(0x28, 0x2, 0x0) mmap$binder(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f00000005c0), &(0x7f0000000680)=0x4) socket$inet6(0xa, 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000380)={@sco, {&(0x7f0000000200)=""/86, 0x56}, &(0x7f00000000c0)}, 0xa0) syz_execute_func(&(0x7f0000000600)="42805da0610fef69dc0fc201e5eee5eeff0faa0faab7490f38211ac443596b7b2306c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1a660fc4e37bc44379dfb9d6adbe90dfc4c3916efafe9f7f") ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000440)=ANY=[]) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:38:55 executing program 3: semget$private(0x0, 0x7, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000002c0)=""/138) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:56 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x0, 0x108, 0x0, 0x108, 0x108, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000004c0), {[{{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'gretap0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@mcast2, @dev, [], [], 'bcsf0\x00', 'team_slave_1\x00'}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:38:56 executing program 0: syz_emit_ethernet(0x2c, &(0x7f0000000400)={@dev, @remote, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@current, @current}, {@random, @random="fb465c2a8709"}}}}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) pipe(&(0x7f0000000700)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000740)={0x50}, 0x50) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) truncate(&(0x7f0000000480)='./file0\x00', 0x0) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000140)}) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) fchmod(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000b880), 0x0, 0x0, 0x0) geteuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000340)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) getgroups(0x0, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:38:56 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) seccomp(0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast2, @dev}, 0x8) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) add_key(&(0x7f00000003c0)='logon\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffff9) clock_gettime(0x0, &(0x7f0000000540)) sysinfo(&(0x7f00000003c0)=""/81) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000340), 0x4) socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000380)={'#! ', './file0'}, 0xb) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000780)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x280, 0x0, 0x280, 0x130, 0x130, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x3e8, 0x4, &(0x7f0000000040), {[{{@ipv6={@mcast1, @dev, [], [], 'tunl0\x00', 'irlan0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x100}, @common=@inet=@SET3={0x38, 'SET\x00'}}, {{@ipv6={@dev, @mcast1, [], [], 'veth1_to_bond\x00', 'ifb0\x00'}, 0x0, 0xc8, 0xf8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x430) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000140)) getpgrp(0xffffffffffffffff) 03:38:56 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x0, 0x108, 0x0, 0x108, 0x108, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000004c0), {[{{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'gretap0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@mcast2, @dev, [], [], 'bcsf0\x00', 'team_slave_1\x00'}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:38:56 executing program 5: getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) eventfd2(0x0, 0x0) epoll_create1(0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:56 executing program 2: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:38:56 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x0, 0x108, 0x0, 0x108, 0x108, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000004c0), {[{{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'gretap0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@mcast2, @dev, [], [], 'bcsf0\x00', 'team_slave_1\x00'}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:38:56 executing program 3: semget$private(0x0, 0x7, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000002c0)=""/138) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:56 executing program 2: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:38:57 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0x0, 0x108, 0x0, 0x108, 0x108, 0x378, 0x378, 0x378, 0x378, 0x378, 0x4, &(0x7f00000004c0), {[{{@ipv6={@remote, @mcast1, [], [], 'tunl0\x00', 'gretap0\x00'}, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0xc8, 0x108}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@ipv6={@mcast2, @dev, [], [], 'bcsf0\x00', 'team_slave_1\x00'}, 0x0, 0xc8, 0x110}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:38:57 executing program 2: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:38:57 executing program 2: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:38:57 executing program 0: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:38:57 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:38:57 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) pipe2(&(0x7f00000001c0), 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000380)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000400)={{}, 'port1\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) socket$packet(0x11, 0x0, 0x300) 03:38:57 executing program 0: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:38:57 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:38:57 executing program 0: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = creat(&(0x7f00001c0000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 03:38:57 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0), 0x3ffffffffffffc8, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='system!\x00systeo\x00'}, 0xfffffea0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xfff6) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001880)) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007dc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000008440)=0xfffffffffffffeab) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007ec0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000007fc0)=0xe8) getgroups(0x0, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008040)) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)) stat(&(0x7f0000008140)='./file0\x00', &(0x7f0000008180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008200)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 907.558860] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:38:57 executing program 3: semget$private(0x0, 0x7, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000002c0)=""/138) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:57 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@loopback, @remote}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @multicast2}, &(0x7f0000000200)=0xc) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:58 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) [ 907.736959] minix_free_inode: bit 1 already cleared 03:38:58 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) pipe2(&(0x7f00000001c0), 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000380)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000400)={{}, 'port1\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) socket$packet(0x11, 0x0, 0x300) 03:38:58 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) [ 908.259138] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:38:58 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0), 0x3ffffffffffffc8, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='system!\x00systeo\x00'}, 0xfffffea0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xfff6) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001880)) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007dc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000008440)=0xfffffffffffffeab) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007ec0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000007fc0)=0xe8) getgroups(0x0, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008040)) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)) stat(&(0x7f0000008140)='./file0\x00', &(0x7f0000008180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008200)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:58 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) [ 908.526098] minix_free_inode: bit 1 already cleared 03:38:58 executing program 3: semget$private(0x0, 0x7, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f00000002c0)=""/138) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000180)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:38:58 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@loopback, @remote}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @multicast2}, &(0x7f0000000200)=0xc) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:59 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) pipe2(&(0x7f00000001c0), 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000380)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000400)={{}, 'port1\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) socket$packet(0x11, 0x0, 0x300) 03:38:59 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) [ 909.192559] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:38:59 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:38:59 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0), 0x3ffffffffffffc8, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='system!\x00systeo\x00'}, 0xfffffea0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xfff6) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001880)) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007dc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000008440)=0xfffffffffffffeab) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007ec0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000007fc0)=0xe8) getgroups(0x0, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008040)) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)) stat(&(0x7f0000008140)='./file0\x00', &(0x7f0000008180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008200)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 909.365972] minix_free_inode: bit 1 already cleared 03:38:59 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:38:59 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@loopback, @remote}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @multicast2}, &(0x7f0000000200)=0xc) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:00 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:00 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) pipe2(&(0x7f00000001c0), 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000240), &(0x7f0000000380)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000400)={{}, 'port1\x00'}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000340), 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[]}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000080)}) flistxattr(0xffffffffffffffff, &(0x7f0000000500)=""/104, 0xffffffffffffff2f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000340)={'bond_slave_1\x00', {0x2, 0x0, @loopback}}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000280)) pipe2(&(0x7f0000000040), 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) truncate(&(0x7f0000000600)='./bus/../file0\x00', 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) socket$packet(0x11, 0x0, 0x300) [ 910.030728] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:39:00 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) [ 910.208703] minix_free_inode: bit 1 already cleared 03:39:00 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:00 executing program 5: socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0), 0x3ffffffffffffc8, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000100)='system!\x00systeo\x00'}, 0xfffffea0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f0000000940)=""/17) accept4$unix(0xffffffffffffff9c, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e, 0x0) request_key(&(0x7f00000006c0)='pkcs7_test\x00', &(0x7f0000000900), &(0x7f0000000b00)='*$\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'team0\x00'}) getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xfff6) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001880)) geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000019c0)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007dc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000008440)=0xfffffffffffffeab) getegid() getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007ec0)={{{@in=@rand_addr, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000007fc0)=0xe8) getgroups(0x0, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008040)) stat(&(0x7f0000008080)='./file0\x00', &(0x7f00000080c0)) stat(&(0x7f0000008140)='./file0\x00', &(0x7f0000008180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000008200)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:00 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:00 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:00 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:00 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000040)={@loopback, @remote}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @multicast2}, &(0x7f0000000200)=0xc) socket$alg(0x26, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:01 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 4: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:01 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:02 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:02 executing program 2: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:02 executing program 3: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:02 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:02 executing program 5: sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) accept4$packet(0xffffffffffffff9c, &(0x7f0000000400), &(0x7f0000000440)=0x14, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000002500)='net/protocols\x00') r0 = memfd_create(&(0x7f0000000080)="008159a7811ff08a4c2ef26daf582a97c324824e153a4cb2c32228332e86baa97788319615b3c5c0ef621d910522a14631a3ba1b92da6a2c5623f76100951ed31d8ce579a26d20ede818e860e27ea2225c7794751c060f1fa1ceab21a9f0fc8eb562733bda3bbc1c5f450104742581f0cda42698c54fba8caf9ad0562f9961e5ad7522b6d558e77bc4aaaf8ee60f95c99744b456819133a2991faf1dbc02dd61af8d9a388798e1a674324e84b8de7d9890b25fe91cf06a3be7ce49b4cdd3c7866fc088afe449cf54904820cb2c41ad6f5609", 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20005) r2 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r2, 0xc0105303, &(0x7f0000000000)={0x3c847480}) r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48008000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0xfe23) syz_open_pts(0xffffffffffffffff, 0x180) 03:39:02 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:02 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:02 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:02 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:02 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000005) ioctl(r0, 0x8912, &(0x7f00000003c0)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000400), 0x2000040c, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @local}, @FRA_SRC={0x8, 0x2, @remote}]}, 0x30}}, 0x0) [ 912.542582] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 912.587186] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 912.606812] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 03:39:03 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:03 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000005) ioctl(r0, 0x8912, &(0x7f00000003c0)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000400), 0x2000040c, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @local}, @FRA_SRC={0x8, 0x2, @remote}]}, 0x30}}, 0x0) [ 912.836611] minix_free_inode: bit 1 already cleared [ 912.842068] minix_free_inode: bit 1 already cleared [ 912.888260] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 03:39:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000005) ioctl(r0, 0x8912, &(0x7f00000003c0)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000400), 0x2000040c, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @local}, @FRA_SRC={0x8, 0x2, @remote}]}, 0x30}}, 0x0) [ 913.028198] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 913.039714] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:39:03 executing program 3: ioprio_set$uid(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='%*posix_acl_access\x00'}, 0x10) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) ioprio_set$uid(0x0, 0x0, 0x0) [ 913.195454] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 03:39:03 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:03 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) [ 913.336306] minix_free_inode: bit 1 already cleared 03:39:03 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000005) ioctl(r0, 0x8912, &(0x7f00000003c0)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f0000000540)={&(0x7f0000000400), 0x2000040c, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x30, 0x20, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @local}, @FRA_SRC={0x8, 0x2, @remote}]}, 0x30}}, 0x0) [ 913.410589] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 913.416811] minix_free_inode: bit 1 already cleared [ 913.474016] netlink: 4 bytes leftover after parsing attributes in process `syz-executor0'. 03:39:03 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:03 executing program 0: ioperm(0x0, 0x101, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 913.554604] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 913.648465] minix_free_inode: bit 1 already cleared 03:39:04 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) [ 913.826461] minix_free_inode: bit 1 already cleared [ 914.172666] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:39:04 executing program 3: ioprio_set$uid(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='%*posix_acl_access\x00'}, 0x10) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) ioprio_set$uid(0x0, 0x0, 0x0) [ 914.311839] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 914.320916] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:39:04 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) 03:39:04 executing program 4: statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)=""/4096) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockname(0xffffffffffffff9c, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000540)=0x1d) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001600), 0x4) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000400)) mq_open(&(0x7f0000000440)='(\x00', 0x0, 0x0, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)) stat(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001780)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6=@mcast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001cc0)=0xe8) stat(&(0x7f0000001d00)='./file0/file0\x00', &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000002000)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002040)) stat(&(0x7f00000020c0)='./file0/file0\x00', &(0x7f0000002100)) stat(&(0x7f0000002180)='./file0/file0\x00', &(0x7f00000021c0)) setxattr$system_posix_acl(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f0000002240), 0x24, 0x0) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:39:04 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x40, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r0) r1 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x80040, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000015c0)={r1, &(0x7f0000000500)="59fdb8ae36a870014b95eeda598578369496d0fa3124824508f6d8f8724300307e2cec09eca69a6468d5c22c11a751bedde6435ae8ddf6ad9369323b36fc687949895eaac5127fa84d0d8f9f230f1304dec329689c0054ce29c5b5536cd8b0eb687ebaa7214ee8b634454afa01369f889873d09bd6009533a5368bd7961470a72337f15eda5f9801723fda933a78a9ebd6179542d2b79e8df0", &(0x7f00000005c0)=""/4096}, 0x18) pipe(&(0x7f0000000100)) r2 = request_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)='/dev/ppp\x00', 0xfffffffffffffff9) r3 = request_key(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000480)='\x00', 0xfffffffffffffffa) keyctl$link(0x8, r2, r3) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000140)=0x1, 0x4) shmget(0x0, 0x2000, 0x140e, &(0x7f0000000000/0x2000)=nil) shmctl$IPC_RMID(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r4, 0x0) shmctl$IPC_RMID(0x0, 0x0) r5 = semget(0x3, 0x2, 0x20) semctl$GETVAL(r5, 0x0, 0xc, &(0x7f0000000180)=""/204) syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="078cffff29006000000cda40fff9d4c97f13", 0x12, 0x400}], 0x0, 0x0) [ 914.495946] minix_free_inode: bit 1 already cleared 03:39:04 executing program 0: ioperm(0x0, 0x101, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 914.555986] minix_free_inode: bit 1 already cleared [ 914.561211] minix_free_inode: bit 1 already cleared [ 914.631547] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:39:05 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 914.817756] minix_free_inode: bit 1 already cleared [ 915.071232] MINIX-fs: mounting unchecked file system, running fsck is recommended [ 915.102131] MINIX-fs: mounting unchecked file system, running fsck is recommended 03:39:05 executing program 2: prctl$seccomp(0xe, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000440)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000580)}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000640)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "dc8e5b", "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"}}, 0x110) 03:39:05 executing program 5: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000380), &(0x7f0000000380), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000480)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) quotactl(0x0, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000b00)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000ac0)=0xc) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000700)) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/226, &(0x7f0000000680)=0xe2) openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) timer_create(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000740), &(0x7f0000000800)}}, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200), &(0x7f00000002c0)=0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.nlink\x00', &(0x7f00000009c0)={'L-', 0x30}, 0x28, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:05 executing program 3: ioprio_set$uid(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='%*posix_acl_access\x00'}, 0x10) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) ioprio_set$uid(0x0, 0x0, 0x0) [ 915.265883] minix_free_inode: bit 1 already cleared [ 915.285886] minix_free_inode: bit 1 already cleared 03:39:05 executing program 0: ioperm(0x0, 0x101, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:05 executing program 4: statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)=""/4096) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockname(0xffffffffffffff9c, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000540)=0x1d) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001600), 0x4) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000400)) mq_open(&(0x7f0000000440)='(\x00', 0x0, 0x0, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)) stat(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001780)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6=@mcast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001cc0)=0xe8) stat(&(0x7f0000001d00)='./file0/file0\x00', &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000002000)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002040)) stat(&(0x7f00000020c0)='./file0/file0\x00', &(0x7f0000002100)) stat(&(0x7f0000002180)='./file0/file0\x00', &(0x7f00000021c0)) setxattr$system_posix_acl(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f0000002240), 0x24, 0x0) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:39:05 executing program 5: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000380), &(0x7f0000000380), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000480)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) quotactl(0x0, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000b00)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000ac0)=0xc) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000700)) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/226, &(0x7f0000000680)=0xe2) openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) timer_create(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000740), &(0x7f0000000800)}}, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200), &(0x7f00000002c0)=0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.nlink\x00', &(0x7f00000009c0)={'L-', 0x30}, 0x28, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:06 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:39:06 executing program 5: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000380), &(0x7f0000000380), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000480)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) quotactl(0x0, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000b00)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000ac0)=0xc) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000700)) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/226, &(0x7f0000000680)=0xe2) openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) timer_create(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000740), &(0x7f0000000800)}}, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200), &(0x7f00000002c0)=0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.nlink\x00', &(0x7f00000009c0)={'L-', 0x30}, 0x28, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:06 executing program 3: ioprio_set$uid(0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='%*posix_acl_access\x00'}, 0x10) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) ioprio_set$uid(0x0, 0x0, 0x0) 03:39:06 executing program 2: prctl$seccomp(0xe, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000440)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000580)}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000640)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "dc8e5b", "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"}}, 0x110) 03:39:06 executing program 5: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000380), &(0x7f0000000380), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000480)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) quotactl(0x0, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000b00)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000ac0)=0xc) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000700)) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/226, &(0x7f0000000680)=0xe2) openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) timer_create(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000740), &(0x7f0000000800)}}, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200), &(0x7f00000002c0)=0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.nlink\x00', &(0x7f00000009c0)={'L-', 0x30}, 0x28, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:06 executing program 0: ioperm(0x0, 0x101, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f00000003c0)=0x1c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000400)={@loopback}, &(0x7f0000000440)=0x20) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:06 executing program 4: statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)=""/4096) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockname(0xffffffffffffff9c, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000540)=0x1d) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001600), 0x4) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000400)) mq_open(&(0x7f0000000440)='(\x00', 0x0, 0x0, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)) stat(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001780)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6=@mcast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001cc0)=0xe8) stat(&(0x7f0000001d00)='./file0/file0\x00', &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000002000)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002040)) stat(&(0x7f00000020c0)='./file0/file0\x00', &(0x7f0000002100)) stat(&(0x7f0000002180)='./file0/file0\x00', &(0x7f00000021c0)) setxattr$system_posix_acl(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f0000002240), 0x24, 0x0) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:39:06 executing program 5: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000380), &(0x7f0000000380), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000480)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) quotactl(0x0, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000b00)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000ac0)=0xc) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000700)) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/226, &(0x7f0000000680)=0xe2) openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) timer_create(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000740), &(0x7f0000000800)}}, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200), &(0x7f00000002c0)=0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.nlink\x00', &(0x7f00000009c0)={'L-', 0x30}, 0x28, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:07 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:39:07 executing program 5: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000380), &(0x7f0000000380), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000480)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) quotactl(0x0, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000b00)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000ac0)=0xc) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000700)) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/226, &(0x7f0000000680)=0xe2) openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) timer_create(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000740), &(0x7f0000000800)}}, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200), &(0x7f00000002c0)=0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.nlink\x00', &(0x7f00000009c0)={'L-', 0x30}, 0x28, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:07 executing program 3: pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:39:07 executing program 2: prctl$seccomp(0xe, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000440)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000580)}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000640)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "dc8e5b", "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"}}, 0x110) 03:39:07 executing program 5: mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000380), &(0x7f0000000380), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f0000000480)='/dev/zero\x00', 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) quotactl(0x0, &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000b00)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @loopback, @multicast1}, &(0x7f0000000ac0)=0xc) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000700)) syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/226, &(0x7f0000000680)=0xe2) openat$zero(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) timer_create(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000740), &(0x7f0000000800)}}, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200), &(0x7f00000002c0)=0x8) setxattr$trusted_overlay_nlink(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)='trusted.overlay.nlink\x00', &(0x7f00000009c0)={'L-', 0x30}, 0x28, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:39:07 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:07 executing program 4: statfs(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)=""/4096) prctl$getname(0x10, &(0x7f0000000580)=""/85) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockname(0xffffffffffffff9c, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000540)=0x1d) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001600), 0x4) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000400)) mq_open(&(0x7f0000000440)='(\x00', 0x0, 0x0, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)) stat(&(0x7f00000016c0)='./file0/file0\x00', &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001780)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in=@local, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6=@mcast1, @in6=@local}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@local}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001bc0)={{{@in6=@ipv4={[], [], @local}, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000001cc0)=0xe8) stat(&(0x7f0000001d00)='./file0/file0\x00', &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001ec0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000002000)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002040)) stat(&(0x7f00000020c0)='./file0/file0\x00', &(0x7f0000002100)) stat(&(0x7f0000002180)='./file0/file0\x00', &(0x7f00000021c0)) setxattr$system_posix_acl(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='system.posix_acl_access\x00', &(0x7f0000002240), 0x24, 0x0) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) chdir(&(0x7f0000000380)='./file0/file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:39:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f00000001c0)="f20f35f20f59e1660f383f6fef22b800903e0f3066b8000000000f23c80f21f866350c00c0000f23f8db3c0f20c06635000004000f22c0ba4300b0f0ee0f21f6", 0x40}], 0x1, 0x0, &(0x7f00000000c0), 0x1df) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f00000000c0)) 03:39:07 executing program 5: munlockall() keyctl$set_reqkey_keyring(0xc, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, &(0x7f0000000240)=0xb4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:07 executing program 1: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b00), &(0x7f0000001b40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001b80)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000001c80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001dc0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001f00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001f40)={{{@in6=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000002040)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002080)={@multicast2, @dev}, &(0x7f00000020c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002140)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002300), &(0x7f0000002340)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002440)={0x0, @remote, @local}, &(0x7f0000002480)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002900)={&(0x7f0000000480), 0xc, &(0x7f00000028c0)={&(0x7f00000024c0)={0x14}, 0x14}}, 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, &(0x7f0000001480)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00', &(0x7f0000000d00)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) lstat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) fstat(0xffffffffffffffff, &(0x7f0000001080)) fstat(0xffffffffffffff9c, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getgroups(0x0, &(0x7f0000001200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:39:08 executing program 5: munlockall() keyctl$set_reqkey_keyring(0xc, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, &(0x7f0000000240)=0xb4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:08 executing program 3: pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:39:08 executing program 2: prctl$seccomp(0xe, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$set_reqkey_keyring(0x5, 0x0) futex(&(0x7f0000000ac0), 0x1, 0x0, &(0x7f0000000b00)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000540)}) keyctl$set_reqkey_keyring(0x10, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x10, &(0x7f00000004c0)={&(0x7f00000003c0)=""/240, 0xf0}}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000200)=""/131, 0xfffffffffffffd70}}, 0x11a) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) getpgid(0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) msgget$private(0x0, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000440)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000580)}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, &(0x7f0000000640)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "dc8e5b", "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"}}, 0x110) 03:39:08 executing program 5: munlockall() keyctl$set_reqkey_keyring(0xc, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, &(0x7f0000000240)=0xb4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:08 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:08 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:08 executing program 5: munlockall() keyctl$set_reqkey_keyring(0xc, 0x0) syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@assoc_value, &(0x7f0000000240)=0xb4) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:08 executing program 1: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:09 executing program 5: pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:39:09 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:09 executing program 3: pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:39:09 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:09 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:09 executing program 1: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:09 executing program 5: pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:39:10 executing program 3: pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:39:10 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:10 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:10 executing program 4: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:10 executing program 1: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000300)=""/9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) keyctl$read(0xb, 0x0, &(0x7f00000003c0)=""/44, 0x2c) getitimer(0x0, &(0x7f0000000140)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) get_mempolicy(&(0x7f0000000040), &(0x7f00000000c0), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:39:10 executing program 5: pkey_alloc(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='em1$\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000340)) write$evdev(0xffffffffffffffff, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000002c0), &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:39:11 executing program 3: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") 03:39:11 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:11 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x301040, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000240)) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond0\x00', {0x2, 0x0, @multicast1}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:11 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000380)) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eece410fbaff5719fa380f38ac2121f3f081768cc8000000c4d181b5e5bc6b1000002121f00fbab204000000ca650f38c812dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_to_bridge\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f0000000480)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) [ 921.159079] audit: type=1326 audit(2000000351.447:59): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2765 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:39:11 executing program 1: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da087dce9dce9ef69dc00d9ce41ff0f450faa373664660f1219c4c19086d9f28fc9410feefa4e2179fbe5e541f0450f9d1ac4010d64ac1e5d31a3b706e2989f440f1ae2") 03:39:11 executing program 5: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:39:12 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:39:12 executing program 3: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") [ 921.879790] audit: type=1326 audit(2000000352.167:60): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2765 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:39:12 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x301040, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000240)) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond0\x00', {0x2, 0x0, @multicast1}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:12 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000380)) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eece410fbaff5719fa380f38ac2121f3f081768cc8000000c4d181b5e5bc6b1000002121f00fbab204000000ca650f38c812dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_to_bridge\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f0000000480)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 03:39:12 executing program 1: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da087dce9dce9ef69dc00d9ce41ff0f450faa373664660f1219c4c19086d9f28fc9410feefa4e2179fbe5e541f0450f9d1ac4010d64ac1e5d31a3b706e2989f440f1ae2") [ 922.187162] audit: type=1326 audit(2000000352.477:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2793 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:39:12 executing program 5: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:39:12 executing program 2: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:39:13 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x301040, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000240)) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond0\x00', {0x2, 0x0, @multicast1}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:13 executing program 3: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") 03:39:13 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000380)) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eece410fbaff5719fa380f38ac2121f3f081768cc8000000c4d181b5e5bc6b1000002121f00fbab204000000ca650f38c812dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_to_bridge\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f0000000480)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 03:39:13 executing program 1: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da087dce9dce9ef69dc00d9ce41ff0f450faa373664660f1219c4c19086d9f28fc9410feefa4e2179fbe5e541f0450f9d1ac4010d64ac1e5d31a3b706e2989f440f1ae2") [ 923.098415] audit: type=1326 audit(2000000353.387:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2817 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:39:13 executing program 5: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:39:13 executing program 2: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:39:14 executing program 3: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) socket$vsock_dgram(0x28, 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) getrusage(0x0, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f00000003c0), 0x0) geteuid() getresgid(&(0x7f00000000c0), &(0x7f00000001c0), &(0x7f0000000200)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000003c0)=ANY=[]) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0120fef69dc0f01ee67f04683090019fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae519f075450f2e1a44dbe264642e3e0f1be80703") 03:39:14 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x301040, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000240)) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond0\x00', {0x2, 0x0, @multicast1}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:14 executing program 4: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000300)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) fcntl$getown(0xffffffffffffff9c, 0x9) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000380)) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eece410fbaff5719fa380f38ac2121f3f081768cc8000000c4d181b5e5bc6b1000002121f00fbab204000000ca650f38c812dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000400)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)='veth0_to_bridge\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@local}, &(0x7f0000000480)=0x14) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) 03:39:14 executing program 1: keyctl$set_reqkey_keyring(0x6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da087dce9dce9ef69dc00d9ce41ff0f450faa373664660f1219c4c19086d9f28fc9410feefa4e2179fbe5e541f0450f9d1ac4010d64ac1e5d31a3b706e2989f440f1ae2") [ 923.987202] audit: type=1326 audit(2000000354.277:63): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=2836 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:39:14 executing program 5: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:39:14 executing program 2: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:39:14 executing program 0: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:39:14 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x301040, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000240)) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond0\x00', {0x2, 0x0, @multicast1}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003cc0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x98) 03:39:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003cc0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x98) 03:39:15 executing program 1: prctl$getreaper(0x59616d61, &(0x7f0000000080)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000180)={0x0, 0x2710}, 0x10) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000100)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/220) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000480)="428055a0a66969ef69dc00d9f0008f0000802046808453ddd9e8fb7a7c0fbb370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000abe129232923450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9ff59fc421f970f97082feefffff7f94c4a1b15c8941797620fbc9") 03:39:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003cc0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x98) 03:39:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000003cc0)={0x0, @in6={{0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x98) 03:39:15 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 03:39:15 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:15 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:15 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 925.417724] Dead loop on virtual device ip6_vti0, fix it urgently! 03:39:15 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) [ 925.460427] Dead loop on virtual device ip6_vti0, fix it urgently! [ 925.487215] Dead loop on virtual device ip6_vti0, fix it urgently! 03:39:15 executing program 0: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") [ 925.538360] Dead loop on virtual device ip6_vti0, fix it urgently! [ 925.553178] Dead loop on virtual device ip6_vti0, fix it urgently! 03:39:15 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x301040, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000240)) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond0\x00', {0x2, 0x0, @multicast1}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:15 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) [ 925.585340] Dead loop on virtual device ip6_vti0, fix it urgently! 03:39:16 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 03:39:16 executing program 1: prctl$getreaper(0x59616d61, &(0x7f0000000080)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000180)={0x0, 0x2710}, 0x10) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000100)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/220) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000480)="428055a0a66969ef69dc00d9f0008f0000802046808453ddd9e8fb7a7c0fbb370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000abe129232923450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9ff59fc421f970f97082feefffff7f94c4a1b15c8941797620fbc9") 03:39:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:16 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:16 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:16 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:16 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:16 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:16 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:16 executing program 0: sysinfo(&(0x7f00000008c0)=""/4096) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000600)) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000003c0)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") [ 926.436489] Dead loop on virtual device ip6_vti0, fix it urgently! [ 926.468964] Dead loop on virtual device ip6_vti0, fix it urgently! [ 926.480089] Dead loop on virtual device ip6_vti0, fix it urgently! 03:39:16 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x301040, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000240)) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)=""/28) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) migrate_pages(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={'bond0\x00', {0x2, 0x0, @multicast1}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:16 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:16 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 926.510676] Dead loop on virtual device ip6_vti0, fix it urgently! 03:39:17 executing program 1: prctl$getreaper(0x59616d61, &(0x7f0000000080)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000180)={0x0, 0x2710}, 0x10) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000100)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/220) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000480)="428055a0a66969ef69dc00d9f0008f0000802046808453ddd9e8fb7a7c0fbb370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000abe129232923450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9ff59fc421f970f97082feefffff7f94c4a1b15c8941797620fbc9") 03:39:17 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:17 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:17 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:17 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:17 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:17 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:18 executing program 1: prctl$getreaper(0x59616d61, &(0x7f0000000080)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x5, 0x0) seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000180)={0x0, 0x2710}, 0x10) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000100)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/220) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000480)="428055a0a66969ef69dc00d9f0008f0000802046808453ddd9e8fb7a7c0fbb370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000abe129232923450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9ff59fc421f970f97082feefffff7f94c4a1b15c8941797620fbc9") 03:39:18 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:18 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:18 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:18 executing program 5: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:18 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:19 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:19 executing program 3: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:19 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:19 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:19 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:19 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 03:39:19 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:20 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r0, 0x80487436, &(0x7f0000000040)) 03:39:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 03:39:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 03:39:20 executing program 1: sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000002d00)={0x8, "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", 0x1000}, 0xfffffffffffffd15) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) getpgrp(0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000600)={{}, 'syz1\x00'}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)=""/151) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) 03:39:20 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 03:39:20 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:20 executing program 0: clock_getres(0x2, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000180)) semget(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000600), &(0x7f0000000640), 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000780)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000500)=""/63) timer_delete(0x0) syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000006c0)={{}, 'port0\x00'}) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) semget(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0876969ef69dc00d9f0008f00008020c4a3750647099e1837370f38211ac4c19086d9f28fc9410feefac461b1e121e5e54175450f2e1ac4010d6453ac5d31a3b7f0802403088e9fa3a74b") 03:39:20 executing program 5: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 03:39:20 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f000004a000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 03:39:20 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000026c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@exit]}, &(0x7f0000000080)='syzkaller\x00', 0x81, 0x0, 0x0, 0x41000, 0x1, [], r0, 0xc}, 0x48) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 03:39:20 executing program 3: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:39:20 executing program 5: ioprio_set$uid(0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000001bc0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001c00)) clock_gettime(0x0, &(0x7f0000001c40)) clock_gettime(0x0, &(0x7f0000001c80)) clock_gettime(0x0, &(0x7f0000001cc0)) clock_gettime(0x0, &(0x7f0000001d00)) write$evdev(0xffffffffffffffff, &(0x7f0000001d40), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000500)={@in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, "3b6c43270b9023e3942f097371b972d648f314dcafe75dac0560d2fc16ea03e402342c62953079fc28d61de4489753d68b96b3a13f022bb6fa93d930423c5393205f4f957a04e7e1ae955d1268631727"}, 0xd8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000740)='./file1\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) close(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000680)=""/188) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f00000002c0)) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000001b80)='highspeed\x00', 0xa) keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000007c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") [ 930.646754] net_ratelimit: 33 callbacks suppressed [ 930.646835] Dead loop on virtual device ip6_vti0, fix it urgently! 03:39:21 executing program 2: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @loopback}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000000ac0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14) clock_gettime(0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffffff, &(0x7f0000004d00), 0x4000000000002cd, 0x0, &(0x7f0000000300)={0x77359400}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f80)={0x0, @multicast1}, &(0x7f0000004fc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000006c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006cc0)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000006e80)={&(0x7f0000006d00)=@xdp, 0x80, &(0x7f0000006d80), 0x0, &(0x7f0000006dc0)=""/146, 0x92}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007380)={&(0x7f0000000040), 0xc, &(0x7f0000007340)={&(0x7f0000006ec0)=ANY=[]}}, 0x0) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:39:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x8000000000003) 03:39:21 executing program 4: add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) prctl$void(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)=""/107, 0x6b) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:21 executing program 1: sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000002d00)={0x8, "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", 0x1000}, 0xfffffffffffffd15) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) getpgrp(0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000600)={{}, 'syz1\x00'}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)=""/151) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) 03:39:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x8000000000003) 03:39:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x8000000000003) 03:39:21 executing program 0: clock_getres(0x2, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000180)) semget(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000600), &(0x7f0000000640), 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000780)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000500)=""/63) timer_delete(0x0) syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000006c0)={{}, 'port0\x00'}) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) semget(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0876969ef69dc00d9f0008f00008020c4a3750647099e1837370f38211ac4c19086d9f28fc9410feefac461b1e121e5e54175450f2e1ac4010d6453ac5d31a3b7f0802403088e9fa3a74b") 03:39:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x8000000000003) 03:39:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x8000000000003) 03:39:21 executing program 3: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:39:22 executing program 2: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @loopback}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000000ac0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14) clock_gettime(0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffffff, &(0x7f0000004d00), 0x4000000000002cd, 0x0, &(0x7f0000000300)={0x77359400}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f80)={0x0, @multicast1}, &(0x7f0000004fc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000006c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006cc0)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000006e80)={&(0x7f0000006d00)=@xdp, 0x80, &(0x7f0000006d80), 0x0, &(0x7f0000006dc0)=""/146, 0x92}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007380)={&(0x7f0000000040), 0xc, &(0x7f0000007340)={&(0x7f0000006ec0)=ANY=[]}}, 0x0) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:39:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x8000000000003) 03:39:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000a9a000)={0xfffffffffffffffe}, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000000)="2c9908871cde871334bd41ea5c8c6500", 0x4) fallocate(r0, 0x0, 0x0, 0x8000000000003) 03:39:22 executing program 1: sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000002d00)={0x8, "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", 0x1000}, 0xfffffffffffffd15) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) getpgrp(0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000600)={{}, 'syz1\x00'}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)=""/151) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) 03:39:22 executing program 4: add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) prctl$void(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)=""/107, 0x6b) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:22 executing program 5: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:39:22 executing program 0: clock_getres(0x2, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000180)) semget(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000600), &(0x7f0000000640), 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000780)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000500)=""/63) timer_delete(0x0) syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000006c0)={{}, 'port0\x00'}) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) semget(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0876969ef69dc00d9f0008f00008020c4a3750647099e1837370f38211ac4c19086d9f28fc9410feefac461b1e121e5e54175450f2e1ac4010d6453ac5d31a3b7f0802403088e9fa3a74b") 03:39:22 executing program 3: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:39:22 executing program 2: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @loopback}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000000ac0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14) clock_gettime(0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffffff, &(0x7f0000004d00), 0x4000000000002cd, 0x0, &(0x7f0000000300)={0x77359400}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f80)={0x0, @multicast1}, &(0x7f0000004fc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000006c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006cc0)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000006e80)={&(0x7f0000006d00)=@xdp, 0x80, &(0x7f0000006d80), 0x0, &(0x7f0000006dc0)=""/146, 0x92}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007380)={&(0x7f0000000040), 0xc, &(0x7f0000007340)={&(0x7f0000006ec0)=ANY=[]}}, 0x0) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:39:23 executing program 1: sysinfo(&(0x7f00000003c0)=""/182) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, &(0x7f0000000700)=0x10) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000080), 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000002d00)={0x8, "b8dbf5b198efef33392ef4ac1d81791c4af4ee9f4059b63da3afd485c8e8a1fce9b55e216bc5f4e153c213859b14cd5e498d240f1020e1fd892c23236c321d28faad47612ed8cd781eb9218ac9a60f4dc91da19a1baae4f74b6ad34702b9dc19769e68818051d4f6324945cb7ec7c656a55bb59874a37f315bd391f928cce0fcacacf9a27d8de92f1a634a6a9dc4599512a6491f717370c43444a53d93437f67f125bdf7b360fa40a972e0237f92a1e2fc762666cb069063e28531512ea9e0396d542afc2481b34a0f6ea76d960ad6a9836add0cd83de2bfdd38d9c24da0e4b0151d75d66da8d5a044fe6cc7ab719d7e607d0f61c4eb883c3063da66cb6b15868a20841a41d6d33150f4576862ab79b53cccbdc1699a887a84e683a4992af7a244da6d600aff738f7035ba58744e32eec8f9b046211870940d5df15b6870f112f9a74c8ffc438f1445ef0c9c778f4e1e702216e6e84ee236febe554bf41f8c9e64ec228a9cb765b3a1cd76cce09e9b5435e2175cd81b123cee6f7261aeaa8ea7453dc107abc2f36b2e613a3e31ec9810f2a69549d58397275e15aed2f35583e02b36aa505cce5eacb8f8c0a3d9d66dd586117837227acf3969427185a0faceca88ef358f2df89052bb9f23b621204860c7221c28028c24015758a56292681edbb5dac7aac468be4015751cdb5834b63638ee62c07f7ceb11445cff23fd81fa66ed91ab86d50bc9f879207bb68636d4de207f82027006a1776f117b1ee48f59f7923719219b8a7e2208167a287c4a5e67ae437c53e8c1fdd772a0cfd10fc8dc27aee5cf0b88ff76358ae31c832a9aaf59691e07ac1394fc239fa672e090334b06fa66d4afd5d8811b65f36b72cc6d3cd692538b63e452f4096276523eb5819b850a93048222ccfc66fe02f40e767b09d8346a4cd1278dbf7d985185a6704f1593bd3a07c421a3fbb5e17f9f777903a24dfdcdd1c5fb41c5aa168b40c25cb5efe474ee93f989f7700283af0eef4c675074263e88aa32ac2aeb264c984c83021df50cc1c49ab6ebbc3f64a2c24326ebfd3182fefa381e352df385bbb3af1ed79ca85bf6e6152079bd9483257f7eb59e63f7dc13f7778d656fac7daa71aa60677041324b7ba7832350b0e5177f1129ba38dd627044f25e7e495b5be1d8c8c860fb73852319e9fcbe6241d5de687b42ad463ca5be4693f6113ba6996449e7ee40213a79ed384982e6c64c18f60ed58c09e988d3b7273d4a5d520602e998049cc41081b100b3966257e1653e1dcec78de870637ebada259a936009c4f05d5c7f688e037f81f94915b7a2056da5eefc36be6d85b5d420f01204d9fa7336cb939705a207391f576e7d61f466778d582060f80a25c68b4b6b159c335e72f611bc9adb0f95b1e745336c2618594d608bca391c130f9ca20a9a1e4d131a541274b698a9cb28682c4f56067ce1e5eb455e8d868cad22bad42e088ff0b327d7f4aa20788468ece612a2256f1db82b4ba16193caa9c737634f737e34a824a8098b79117a4896edb7291b085a1cbe5fd177bc30fc7f963462e7e49966e7cfa69ed50265fc3c1334ce50451c9fc009b4c6141bd01ec21e41b9fcefa84f245e365e9315f364e5017cbfedd8c3c7c8805a1c7d11144efb2cbec42d549b575f2f54060eeede90690f1f484ec5622511c9ebece07388f72ec1f821862e0dde11db41abdf867f3081c567ec8a84f5c894203feedea99801d4db345ac5833bc0726a57dccacc0ea2fb7d14b8ca0e6d381102326067048738a3b344fffeb96dc02ca3b1abd207fc1a4eafd14aa3662c3d1a02f59af48aedb93bf7c9f63af24a98cc27f8712b08ba42757021104dceb800fff336d6e5e4f787c9f88f2a6fbcd5d29a09df78e4eee496e89ed3f827ea2a6af1e7884acbce9ffc777a18ecb262393e870f441a8426da089828f22a48fc0513247c53cc1d53b7036034ef47c6c7d2810f6c875f38be7c378e03518c35a473cca0d5444ddda53fad9dc264ec04df37411124db3cf445d9754a6eb2e2de175059b9a105336e89318bd6a6b4dd8fe2bc7460b7625036c762c818693be55acfb0f3a45ef337bab512891a09991f13c8ce531b9a222886e2465c11558c350e5ce593a2d7a974ab9159f6135ffcce93f0a901991bc723bec484efc6a632c5f948cf246231105699cf3ebb87d465a56a9479301614762c668822f35b4330e94da86fac8c339e85ca4c68b34d9b37ad5cb9e354335d662ce7a17fd2975faa7770a229fbebf3564003af2700a9f83a7603c109787d0b3c9bbf826749c8a0e2453b0969b51f6dfb897911ac67b5bbe2c759518cf6c64b5348763dcc3c6c4c1a01eaec37f03a3bb829c0cc8926fec566a100b4d91bf148decfc6ee1f88448a7a8d070d39530070f552f82542590c7ed099c7777d3829603fda35d4866e9e0b750522ab827d7e147d766b07e524e75a2238d5031fd552dbbc864dad19f88a96c986f8d79096d376b7a0399a314188d01ab98aa9b344c2f6deb8628a21c30632a84a94f515baca8408a79746bbb3b1bec8b8f30626e0ffa4ddf0dd1800bf81efc0ef2a5f5d0e50560355d6fe8af6ce909df66c8968e117e3106852d8ef6430615402bbcaf1f55766becd316ed92285db5fa930dd63569e9c9e294800c976b07a42dedc30ff237b73a63126ad3ba24091961c3786a135dd18de2691345422d7d7cb309611518beafd21392c6ec59535fc7689bec0bed1fa1ab39d17a56271c4d2be8e8b2a1eca037a93aa9e65eb96025d772df0404bc163458b7a79d32dda81fea91896cc8aa1b47c2c5c2dedd7e6a28d523bcdf52d91e90574b635e83e742838e758dd49cfbfaa9628992b8c5bb7bbee83cd652f19a1bbaeb2abe5130f7cb03bb2f8d0db036de6c8294d419415f86abb0f372d516a76712cd43f6ff90fd41ceda42388a4facb3ef2dc97a5efa11ac91a0ed4b8f8b278a9737e89371c5a9c4b5bc5ac52511d0ab9c158bbfaabcf02c42d2fe7f364cb8a101e897d91b55ea0c9b7a159f1ff02c588aff337f986bc514a1520ac7356611638f19f0cba48a096e5717be4c4a6322e687b9ea973fae7a1be0f8428ea796685e9502a08daab405cf5e073e62ce8bba9c5515ab74c3fa60b69ff48c25094a39bd54016532c05afb337e4a2b23659f66b2e5ecf048b263ae29564c6026922c351ed08c4a39afa294433bd8f3d2804e668cda22f3482be0e3d3a8ed9e70cb664c1088866ef884a159f42367c8bdb9f831a12b101aad0286d1bfb80d579704e132ccd25a25f21c802b303dfc032e3afcee88aefa34046551df62e3f267a26a7794da6fb792945bfe82cb193a106ab488f85ef6013b824695ee36c661550550696e0019779bb451c6fd5356c78c4dd091e960f19c621c34d69105f9270955f18e00169659fd050f9453d400b054a0bd065b16c3b46750a453e6f268368e76e2d884a1278e4f081635f180212113ff2db6ebdeba71d5b77b4cec5375489a4c48f3e5a46647ba2b716b65685abde25f24fb81e0e7c723c0067a7ef45cd00da39d78fd3830d856138e04912b961945c14bbaead4f0e41f1115f8f5e40aa474dfde6d6e082803f47dae430d30ff81d65122a81683b9b33055573e117fdb9636ccc2661e65f9e2b7a7dfe02ee1aa4996b46fbf0c8a9fa82d04cf9aea441561b8d281041b8eeffa5d82984c9462f159803c3f66624e4cf95a4b6a076a31b35610636c4ea4a34a20cf9cc34e60e1f1f5ee62b59737da82be4bb4f5b14d99045a4a515477f8fc2e358361ad22185fd03b5f8395ae31ff446fd45c0f1140f574fdfbd42be490f25ebc57e9265e18acbec2fba398b38410b6a34df9b5165234532f904a4bd667fdc7524ae11d654987dd9ad7ba4c655c709399b74287367016ca657517c5365f00fae882c84a1fd8d60c0b2c5816c05f74f21b6f95c1f8107213e8a7ed67a4097fd79171c9d51bc853fb4917335b9909c31dd388c8681f099d358bb6efab5c657a851ef5f0a042718fb9f6b99c6c3918f452ea2b6a1b8e09853e1a7038e094cddd06d9d1cca753de261d19343920e790e5a1d33289737c203d409fda4ba28b76fad4abe1defcb40b8d997c13ca6b9dffcfb364cdd213a50e18ff499cf353e8641a24a8a0683510f18b950778755e32f0a7f66249f8b38c950c4247edca0b3a78a1a6e6f4205a81dc6a2f8558a06d244386f38a4eae8f0494ef0e13c85c1d06b3ad885257afb0b269a90bef6d70dc3537698a396e8fc7ae6b42bed6e0d9384c8bf2ca909ec6e6eb1a70c72f06321e105d22c56239271c2102410c8a820f309b617703411385cbb388419337e7c5a45382b3e1ad48ed06c17f3d9c85855037413d700ac7fefa23dd87645b17daebeb3d3d5d31a8defc7b2f36ce5fc79a5705597149dcb90db97eaca9afae73ebcbe3cb69cec125faf7c5ad47e8ca81f912a69eefb8f9a640e0dc70bd1fcf26f0fcf3b90f30be0501391d0e23d713c048d6207a03e9a27b0cadb23286b862860dfca25062f3b251ad6ff32f6516fd5dea098969b1d09243f4d24547ef8665d2741d207d78b59af1226e27b4b39fc03ff8c4ff01d78db7c31711eceff686e4fc767de344d1365bd4075d510e4b6e034640b1e8d521659f1d9b0bb1e00e4b7e1e6a76876a4bd0529efcade827e08f6eb2f33226af02abef1d5b6f8534ddc104083e2ab2b4ac282a413ad89c2df7eb61338223ac1c415a163c9e665250494cc8743fc1b583b1d109c21a863093e441c9d02fa0124a3e3845b471290c540542d98c2fa11764de73654c4ecfb18f1ebd984661436fed4b315032efc0138df13321d1c554abb0620d8c726ea8ffd60de2ab76169c596923945fa405a18b8e8deddddd5cb51f397e56d3dde5282bcbc7b4c2e2beee91703d79dd942e44c3d145822031971ae11a4f63a3c4cd684e65853026401e269897684d618cd01f1233424d1bd3fa6462eed19ae285a52ab6faf8e5c071efda66575f05defc4c3c6e4299e0757bcb9ef4e97d17d7d9164e9846ec40835bd865b0f00be2b756bf472fc4920014c76360566a3606262dbbda641a13dbd4dc544b216652347a71e0fb8b05d703cacea46e58e375db8374bc5604bd930823b95d681e41768c71a888f1714b14ab70c0024db07f6cf3aa8eeb9d4a1e9501dd5b8b504c78ebd1b478c21a7339d0a1f5701c05a6e2a12ceea92ff68182cb8dc8b731fc95e9206cc58b7c8286873a68fa7661f1c996c6554d3e9070d0c25ceda57824620e80834b1fd19753c4d57b7638beae92b9fb3efe9fc88be3f21bba000419444db9d0c33909f4b5a9e8fb854467174d11efa7d8165262c5ed2d461a661d54ba2aee66d87405ff23576d4da36b6bce7e823ad94b11578c6c3f5bd359873e6f8544f8a6ca0f6bccab5b9677dd52130778f8d329b5a6e3e9b4e70be35452401d9c62623de7edd94d3fa8ca6a90f8d85b5a4790029cbe1871cf4209c663da4a0b808d338a5914f91e807e36030911169e3fd4d25a11d91b6e46612951da836e740228fcc32b4c10f5ee60c227dfa91a1b763e14e8a10622ff416e387b1531d577a3b821e84cb7697d0f7256dadf94020888e77057ba3a2ee011ad266ac8f4392a16743c07cf0c19ce57acd4d6152669c5294bd6dcf3e8875e9148e2d39313cc9a021e8ff53c8f317f889f71e35edbe1d96dfffe1bde5fbb68adb57ff6ee20ca7db3968b034c27ba5814417bab23e8437a09c9545ccdbc51eb175f233502764e2abd0002685318b575d12010a15579b8c58", 0x1000}, 0xfffffffffffffd15) write$nbd(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000480)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000c40), 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, 0xe8) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) getpgrp(0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000600)={{}, 'syz1\x00'}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)=""/151) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) 03:39:23 executing program 5: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:39:23 executing program 4: add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) prctl$void(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)=""/107, 0x6b) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:23 executing program 0: clock_getres(0x2, &(0x7f00000002c0)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f0000000300), &(0x7f0000000400)}}, &(0x7f0000000180)) semget(0xffffffffffffffff, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000600), &(0x7f0000000640), 0x8) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000780)) semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000500)=""/63) timer_delete(0x0) syz_open_dev$mouse(&(0x7f0000000680)='/dev/input/mouse#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000006c0)={{}, 'port0\x00'}) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) semget(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0876969ef69dc00d9f0008f00008020c4a3750647099e1837370f38211ac4c19086d9f28fc9410feefac461b1e121e5e54175450f2e1ac4010d6453ac5d31a3b7f0802403088e9fa3a74b") 03:39:23 executing program 3: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:39:23 executing program 2: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @loopback}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000000ac0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14) clock_gettime(0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffffff, &(0x7f0000004d00), 0x4000000000002cd, 0x0, &(0x7f0000000300)={0x77359400}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f80)={0x0, @multicast1}, &(0x7f0000004fc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000006c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006cc0)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000006e80)={&(0x7f0000006d00)=@xdp, 0x80, &(0x7f0000006d80), 0x0, &(0x7f0000006dc0)=""/146, 0x92}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000007380)={&(0x7f0000000040), 0xc, &(0x7f0000007340)={&(0x7f0000006ec0)=ANY=[]}}, 0x0) gettid() syz_open_procfs(0x0, &(0x7f00000001c0)='net/llc\x00') syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000000dc0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000f00)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000f80)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:39:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 5: rt_sigpending(&(0x7f00000000c0), 0x8) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) semget$private(0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[]}}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000900), &(0x7f00000009c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) semtimedop(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000200)={0x0, 0x989680}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=0xc) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:39:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 4: add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) prctl$void(0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)=""/107, 0x6b) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=@fragment, 0x8) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 0: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:24 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001680)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000f40)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000600)=""/73}, 0x18) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000500)={'bridge0\x00', {0x2, 0x0, @multicast1}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@local, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e80)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000ec0), 0x24, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f00000002c0)=0xfffffffffffffdb8) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:39:25 executing program 1: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:25 executing program 0: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/11) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000240)='\x00', &(0x7f0000000580)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) ptrace$peekuser(0x3, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in6, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) setreuid(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffff9c, 0x0, 0x18, &(0x7f0000000340)='vboxnet1!system,(user$(\x00', 0xffffffffffffffff}, 0x30) sched_getattr(0x0, &(0x7f00000003c0), 0x30, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') setrlimit(0x0, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xfffffffffffffc98) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@known='trusted.overlay.metacopy\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) 03:39:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x10000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x8c) 03:39:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, &(0x7f0000000a40)={'IDLETIMER\x00'}, &(0x7f0000000a80)=0x1e) 03:39:25 executing program 4: prctl$intptr(0x4, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000240)) 03:39:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x10000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x8c) 03:39:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f00000001c0)="153f6234488dd25d766070") r1 = socket$kcm(0x29, 0x2, 0x0) unshare(0x400) getsockopt$sock_linger(r1, 0x1, 0x2f, &(0x7f0000000400), &(0x7f0000000440)=0x8) 03:39:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x10000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x8c) 03:39:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, &(0x7f0000000a40)={'IDLETIMER\x00'}, &(0x7f0000000a80)=0x1e) 03:39:25 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYBLOB="4e08d1490889116b6ab42fcacc0161245606903f"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000058000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:39:25 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001680)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000f40)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000600)=""/73}, 0x18) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000500)={'bridge0\x00', {0x2, 0x0, @multicast1}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@local, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e80)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000ec0), 0x24, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f00000002c0)=0xfffffffffffffdb8) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:39:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x10000000210007f9, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x8c) 03:39:25 executing program 0: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/11) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000240)='\x00', &(0x7f0000000580)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) ptrace$peekuser(0x3, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in6, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) setreuid(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffff9c, 0x0, 0x18, &(0x7f0000000340)='vboxnet1!system,(user$(\x00', 0xffffffffffffffff}, 0x30) sched_getattr(0x0, &(0x7f00000003c0), 0x30, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') setrlimit(0x0, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xfffffffffffffc98) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@known='trusted.overlay.metacopy\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) 03:39:25 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, &(0x7f0000000a40)={'IDLETIMER\x00'}, &(0x7f0000000a80)=0x1e) 03:39:25 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYBLOB="4e08d1490889116b6ab42fcacc0161245606903f"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000058000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:39:25 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001680)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000f40)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000600)=""/73}, 0x18) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000500)={'bridge0\x00', {0x2, 0x0, @multicast1}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@local, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e80)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000ec0), 0x24, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f00000002c0)=0xfffffffffffffdb8) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:39:26 executing program 4: prctl$intptr(0x4, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000240)) 03:39:26 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x12, &(0x7f0000000a40)={'IDLETIMER\x00'}, &(0x7f0000000a80)=0x1e) 03:39:26 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYBLOB="4e08d1490889116b6ab42fcacc0161245606903f"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000058000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:39:26 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYBLOB="4e08d1490889116b6ab42fcacc0161245606903f"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000058000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:39:26 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001680)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000f40)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000600)=""/73}, 0x18) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000500)={'bridge0\x00', {0x2, 0x0, @multicast1}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@local, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e80)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000ec0), 0x24, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f00000002c0)=0xfffffffffffffdb8) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:39:26 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYBLOB="4e08d1490889116b6ab42fcacc0161245606903f"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000058000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) 03:39:26 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYBLOB="4e08d1490889116b6ab42fcacc0161245606903f"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000058000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 1041.645614] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1041.651934] rcu: (detected by 1, t=10502 jiffies, g=160381, q=58) [ 1041.658271] rcu: All QSes seen, last rcu_preempt kthread activity 10503 (4295041317-4295030814), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 1041.670924] syz-executor3 R running task 21928 3264 5658 0x00000100 [ 1041.678137] Call Trace: [ 1041.680723] [ 1041.682891] sched_show_task.cold.87+0x2b6/0x30a [ 1041.687657] ? can_nice.part.76+0x20/0x20 [ 1041.691818] ? vprintk_default+0x28/0x30 [ 1041.695888] ? vprintk_func+0x85/0x181 [ 1041.699780] ? vprintk_func+0x85/0x181 [ 1041.703678] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1041.708437] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1041.713205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.718771] print_other_cpu_stall.cold.66+0x7dd/0x8bb [ 1041.724078] ? print_cpu_stall+0x190/0x190 [ 1041.728324] ? __lock_acquire+0x7ec/0x4ec0 [ 1041.732569] ? __lock_acquire+0x7ec/0x4ec0 [ 1041.736811] ? __lock_acquire+0x7ec/0x4ec0 [ 1041.741053] ? mark_held_locks+0x130/0x130 [ 1041.745289] ? print_usage_bug+0xc0/0xc0 [ 1041.749367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.754914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.760460] ? do_trace_rcu_torture_read+0x10/0x10 [ 1041.765401] ? rcu_preempt_need_deferred_qs+0x74/0x1f0 [ 1041.770683] ? rcu_pm_notify+0xc0/0xc0 [ 1041.774580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.780128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.785672] ? check_preemption_disabled+0x48/0x200 [ 1041.790698] rcu_check_callbacks+0xfe5/0x1400 [ 1041.795203] ? __lock_acquire+0x7ec/0x4ec0 [ 1041.799445] ? rcutree_dead_cpu+0x10/0x10 [ 1041.803616] ? mark_held_locks+0x130/0x130 [ 1041.807861] ? graph_lock+0x170/0x170 [ 1041.811663] ? __lock_acquire+0x7ec/0x4ec0 [ 1041.815919] ? perf_swevent_hrtimer+0x405/0x510 [ 1041.820597] ? print_usage_bug+0xc0/0xc0 [ 1041.824672] ? graph_lock+0x170/0x170 [ 1041.828477] ? find_held_lock+0x36/0x1c0 [ 1041.832567] ? cpuacct_account_field+0x219/0x3d0 [ 1041.837334] ? find_held_lock+0x36/0x1c0 [ 1041.841403] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1041.846952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.852502] ? check_preemption_disabled+0x48/0x200 [ 1041.857545] ? trace_hardirqs_off+0xb8/0x310 [ 1041.861957] ? rcu_pm_notify+0xc0/0xc0 [ 1041.865854] ? trace_hardirqs_on_caller+0x310/0x310 [ 1041.870877] ? check_preemption_disabled+0x48/0x200 [ 1041.875910] ? raise_softirq+0x21d/0x420 [ 1041.879982] ? raise_softirq_irqoff+0x2e0/0x2e0 [ 1041.884660] ? account_system_index_time+0x333/0x5d0 [ 1041.889773] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.895316] ? check_preemption_disabled+0x48/0x200 [ 1041.900346] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1041.905890] ? hrtimer_run_queues+0x9a/0x400 [ 1041.910310] ? run_local_timers+0x19b/0x230 [ 1041.914639] ? timer_clear_idle+0x90/0x90 [ 1041.918795] ? irqtime_account_process_tick.isra.6+0x35b/0x490 [ 1041.924780] ? account_process_tick+0x282/0x350 [ 1041.929455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1041.935003] update_process_times+0x2d/0x70 [ 1041.939340] tick_sched_handle+0x9f/0x180 [ 1041.943493] tick_sched_timer+0x45/0x130 [ 1041.947570] __hrtimer_run_queues+0x412/0x10c0 [ 1041.952165] ? tick_sched_do_timer+0x1a0/0x1a0 [ 1041.956756] ? hrtimer_start_range_ns+0xdf0/0xdf0 [ 1041.961611] ? pvclock_read_flags+0x160/0x160 [ 1041.966113] ? trace_hardirqs_on_caller+0x310/0x310 [ 1041.971147] ? kvm_clock_read+0x18/0x30 [ 1041.975125] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1041.980151] ? ktime_get_update_offsets_now+0x3b3/0x540 [ 1041.985526] ? do_timer+0x50/0x50 [ 1041.988986] ? do_raw_spin_unlock+0xa7/0x2f0 [ 1041.993410] ? trace_hardirqs_on_caller+0x310/0x310 [ 1041.998434] ? do_raw_spin_lock+0xc1/0x200 [ 1042.002686] hrtimer_interrupt+0x313/0x780 [ 1042.007028] smp_apic_timer_interrupt+0x1a1/0x750 [ 1042.011886] ? smp_call_function_single_interrupt+0x640/0x640 [ 1042.017777] ? interrupt_entry+0xb5/0xc0 [ 1042.021848] ? trace_hardirqs_off_caller+0xbb/0x300 [ 1042.026868] ? trace_hardirqs_off_caller+0xbb/0x300 [ 1042.031889] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1042.036739] ? trace_hardirqs_off+0x310/0x310 [ 1042.041238] ? trace_hardirqs_off+0x310/0x310 [ 1042.045753] ? task_prio+0x50/0x50 [ 1042.049303] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1042.054847] ? check_preemption_disabled+0x48/0x200 [ 1042.059875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1042.064762] apic_timer_interrupt+0xf/0x20 [ 1042.068993] [ 1042.071249] RIP: 0010:__secure_computing+0x34/0x370 [ 1042.076278] Code: 55 41 54 53 e8 9d 6b ff ff 48 b8 00 00 00 00 00 fc ff df 65 48 8b 1c 25 40 ee 01 00 48 8d bb 70 07 00 00 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 7d 02 00 00 44 8b a3 70 07 00 [ 1042.095178] RSP: 0018:ffff8801d181fc30 EFLAGS: 00000a02 ORIG_RAX: ffffffffffffff13 [ 1042.102891] RAX: dffffc0000000000 RBX: ffff8801be598080 RCX: ffffc90006935000 [ 1042.110162] RDX: 1ffff10037cb30fe RSI: ffffffff817de403 RDI: ffff8801be5987f0 [ 1042.117435] RBP: ffff8801d181fc50 R08: ffff8801be598080 R09: 0000000000000000 [ 1042.124707] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000c000003e [ 1042.131978] R13: ffff8801d181fdf8 R14: ffff8801d181fd78 R15: 0000000000000000 [ 1042.139268] ? __secure_computing+0x13/0x370 [ 1042.143698] syscall_trace_enter+0x4e2/0x1260 [ 1042.148199] ? retint_kernel+0x2d/0x2d [ 1042.152102] ? syscall_get_arguments.part.7+0x10/0x10 [ 1042.157308] ? do_syscall_64+0x9a/0x820 [ 1042.161288] ? do_syscall_64+0x9a/0x820 [ 1042.165269] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1042.169877] do_syscall_64+0x601/0x820 [ 1042.173783] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1042.179154] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1042.184087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1042.188938] ? trace_hardirqs_off+0x310/0x310 [ 1042.193444] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1042.198471] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1042.203324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1042.208514] RIP: 0033:0x4572d9 [ 1042.211731] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1042.230636] RSP: 002b:00007f271a0bbcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1042.238351] RAX: ffffffffffffffda RBX: 00000000009300a8 RCX: 00000000004572d9 [ 1042.245623] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00000000009300a8 [ 1042.252893] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 1042.260164] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000009300ac [ 1042.267437] R13: 00007ffc3428eb0f R14: 00007f271a0bc9c0 R15: 0000000000000000 [ 1042.274736] rcu: rcu_preempt kthread starved for 10564 jiffies! g160381 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 1042.285298] rcu: RCU grace-period kthread stack dump: [ 1042.290489] rcu_preempt R running task 22696 10 2 0x80000000 [ 1042.297703] Call Trace: [ 1042.300344] __schedule+0x86c/0x1ed0 [ 1042.304084] ? __sched_text_start+0x8/0x8 [ 1042.308239] ? __mod_timer+0x6f1/0x1860 [ 1042.312226] ? add_timer_on+0x9f0/0x9f0 [ 1042.316212] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1042.321319] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1042.326434] ? trace_hardirqs_on+0xbd/0x310 [ 1042.330763] ? kasan_check_read+0x11/0x20 [ 1042.334915] ? prepare_to_swait_event+0x25a/0x800 [ 1042.339768] ? trace_hardirqs_off_caller+0x300/0x300 [ 1042.344891] schedule+0xfe/0x460 [ 1042.348269] ? __schedule+0x1ed0/0x1ed0 [ 1042.352253] ? prepare_to_swait_event+0x25a/0x800 [ 1042.357116] ? __init_swait_queue_head+0x150/0x150 [ 1042.362058] ? __lockdep_init_map+0x105/0x590 [ 1042.366592] ? lockdep_init_map+0x9/0x10 [ 1042.370662] schedule_timeout+0x140/0x260 [ 1042.374819] ? usleep_range+0x1a0/0x1a0 [ 1042.378819] ? __next_timer_interrupt+0x1a0/0x1a0 [ 1042.383939] rcu_gp_fqs_loop+0x762/0xa80 [ 1042.388025] ? rcu_gp_fqs_check_wake+0x170/0x170 [ 1042.392790] ? trace_hardirqs_off_caller+0x300/0x300 [ 1042.397901] ? ttwu_stat+0x5c0/0x5c0 [ 1042.401622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1042.407172] ? rcu_gp_init+0x7f3/0x1270 [ 1042.411156] ? rcu_qs+0x110/0x110 [ 1042.414612] ? rcu_accelerate_cbs+0x562/0xae0 [ 1042.419113] ? graph_lock+0x170/0x170 [ 1042.422924] ? graph_lock+0x170/0x170 [ 1042.426745] ? __lock_is_held+0xb5/0x140 [ 1042.430809] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1042.435921] ? __lock_is_held+0xb5/0x140 [ 1042.439992] ? graph_lock+0x170/0x170 [ 1042.443813] ? rcu_accelerate_cbs+0x562/0xae0 [ 1042.448328] ? find_held_lock+0x36/0x1c0 [ 1042.452408] ? rcu_gp_kthread+0x8cf/0xc70 [ 1042.456568] ? _raw_spin_unlock_irq+0x27/0x80 [ 1042.461073] ? _raw_spin_unlock_irq+0x27/0x80 [ 1042.465581] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1042.470170] ? trace_hardirqs_on+0xbd/0x310 [ 1042.474500] ? kasan_check_read+0x11/0x20 [ 1042.478658] ? trace_hardirqs_off_caller+0x300/0x300 [ 1042.483772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1042.489325] rcu_gp_kthread+0x341/0xc70 [ 1042.493309] ? rcu_gp_init+0x1270/0x1270 [ 1042.497379] ? mark_held_locks+0x130/0x130 [ 1042.501632] ? finish_task_switch+0x2f5/0x900 [ 1042.506131] ? __switch_to_asm+0x40/0x70 [ 1042.510201] ? preempt_notifier_register+0x200/0x200 [ 1042.515818] ? __switch_to_asm+0x34/0x70 [ 1042.519883] ? __switch_to_asm+0x34/0x70 [ 1042.523945] ? __switch_to_asm+0x40/0x70 [ 1042.528012] ? __switch_to_asm+0x34/0x70 [ 1042.532089] ? __switch_to_asm+0x40/0x70 [ 1042.536151] ? __switch_to_asm+0x34/0x70 [ 1042.540219] ? __switch_to_asm+0x40/0x70 [ 1042.544286] ? __switch_to_asm+0x34/0x70 [ 1042.548353] ? __switch_to_asm+0x34/0x70 [ 1042.552417] ? __switch_to_asm+0x40/0x70 [ 1042.556485] ? syscall_return_via_sysret+0xe/0x2e [ 1042.561332] ? __switch_to_asm+0x40/0x70 [ 1042.565397] ? __switch_to_asm+0x34/0x70 [ 1042.569462] ? __switch_to_asm+0x40/0x70 [ 1042.573533] ? __schedule+0x874/0x1ed0 [ 1042.577429] ? __switch_to_asm+0x40/0x70 [ 1042.581493] ? __switch_to_asm+0x40/0x70 [ 1042.585575] ? graph_lock+0x170/0x170 [ 1042.589389] ? __sched_text_start+0x8/0x8 [ 1042.593559] ? find_held_lock+0x36/0x1c0 [ 1042.597639] ? __kthread_parkme+0xce/0x1a0 [ 1042.601879] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1042.606986] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 1042.612101] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1042.616694] ? trace_hardirqs_on+0xbd/0x310 [ 1042.621038] ? kasan_check_read+0x11/0x20 [ 1042.625193] ? __kthread_parkme+0xce/0x1a0 [ 1042.629437] ? trace_hardirqs_off_caller+0x300/0x300 [ 1042.634557] ? kasan_check_write+0x14/0x20 [ 1042.638796] ? do_raw_spin_lock+0xc1/0x200 [ 1042.643051] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 1042.648161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1042.653707] ? __kthread_parkme+0xfb/0x1a0 [ 1042.657949] ? rcu_gp_init+0x1270/0x1270 [ 1042.662014] kthread+0x35a/0x440 [ 1042.665397] ? kthread_bind+0x40/0x40 [ 1042.669208] ret_from_fork+0x3a/0x50 03:41:13 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001680)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000f40)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000600)=""/73}, 0x18) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000500)={'bridge0\x00', {0x2, 0x0, @multicast1}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@local, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e80)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000ec0), 0x24, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f00000002c0)=0xfffffffffffffdb8) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:41:14 executing program 0: mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000040)=""/11) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000240)='\x00', &(0x7f0000000580)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000680)) ptrace$peekuser(0x3, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000480)={{{@in6, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) setreuid(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffff9c, 0x0, 0x18, &(0x7f0000000340)='vboxnet1!system,(user$(\x00', 0xffffffffffffffff}, 0x30) sched_getattr(0x0, &(0x7f00000003c0), 0x30, 0x0) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) pipe2(&(0x7f0000000280), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f0000000840)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffff9c, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x80) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') setrlimit(0x0, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xfffffffffffffc98) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) fremovexattr(0xffffffffffffffff, &(0x7f0000000580)=@known='trusted.overlay.metacopy\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) 03:41:14 executing program 4: prctl$intptr(0x4, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000240)) [ 1045.576265] IPVS: ftp: loaded support on port[0] = 21 03:41:15 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYBLOB="4e08d1490889116b6ab42fcacc0161245606903f"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000058000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 1045.704314] IPVS: ftp: loaded support on port[0] = 21 03:41:16 executing program 2: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') seccomp(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000440)={0x8}, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') write$binfmt_misc(0xffffffffffffffff, &(0x7f0000001680)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000f40)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f00000002c0)=ANY=[]) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000600)=""/73}, 0x18) inotify_rm_watch(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000500)={'bridge0\x00', {0x2, 0x0, @multicast1}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001080)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000008c0)=0xe8) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b80)) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@local, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e80)=0xe8) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000ec0), 0x24, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f00000002c0)=0xfffffffffffffdb8) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:41:16 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000003c0)) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000080)=ANY=[@ANYBLOB="4e08d1490889116b6ab42fcacc0161245606903f"], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000058000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) [ 1046.918508] IPVS: ftp: loaded support on port[0] = 21 [ 1047.062125] IPVS: ftp: loaded support on port[0] = 21 [ 1047.094816] IPVS: ftp: loaded support on port[0] = 21 [ 1047.455072] IPVS: ftp: loaded support on port[0] = 21 [ 1047.700896] device bridge_slave_1 left promiscuous mode [ 1047.713367] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.786796] device bridge_slave_0 left promiscuous mode [ 1047.794007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.820596] team0 (unregistering): Port device team_slave_1 removed [ 1049.830536] team0 (unregistering): Port device team_slave_0 removed [ 1049.841214] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1049.889370] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1049.946080] bond0 (unregistering): Released all slaves [ 1050.910064] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.924581] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.953486] device bridge_slave_0 entered promiscuous mode [ 1050.967969] bridge0: port 1(bridge_slave_0) entered blocking state [ 1050.974362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1050.986979] device bridge_slave_0 entered promiscuous mode [ 1051.148002] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.171912] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.181828] device bridge_slave_1 entered promiscuous mode [ 1051.252661] bridge0: port 2(bridge_slave_1) entered blocking state [ 1051.261354] bridge0: port 2(bridge_slave_1) entered disabled state [ 1051.294367] device bridge_slave_1 entered promiscuous mode [ 1051.408701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1051.436246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1051.613966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1051.648936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready