(0x0) r1 = epoll_create1(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)) 22:00:24 executing program 0: futex(&(0x7f00000000c0), 0x9, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)={0xd}, 0xd) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 22:00:24 executing program 1: pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000007c0)) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0xd4}, 0x28, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000d40), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x1c) dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f00000001c0)=@nfc, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000000c0)=""/106, 0x6a}, 0x0) 22:00:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="636c6561725f7265667300b04978e60c4ba32fd7b949714bcbe80c57af59747c61a31619cbafea034f5b6bb15332860b9f14c654d1012484f5c9d8edcad2f073e0ca5078fc64d38d1e297b9d66a71452b92cae675696216e08f21e87b8b54da0d1b5f3b4d6f8caf34a15ed2b2c98fcbf581297b31beafaffb76778a196ad93aa3d2d7a06720827") r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_cache\x00') sendfile(r0, r1, &(0x7f0000000000)=0x7, 0x1) 22:00:24 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) pread64(0xffffffffffffffff, &(0x7f0000000940)=""/4096, 0x1000, 0x0) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0), &(0x7f0000000200)='trusted.overlay.origin\x00', 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000004080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000616ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={&(0x7f0000beb000)=@abs, 0x6e, &(0x7f000000d000), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x400000000000358, 0x10000, 0x0) 22:00:24 executing program 2: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:00:24 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9ce41ff0f1837370f0fdaaac4c19086d9f28fc9410feefa4e2179fbe5e5c4c1e16a9901725e45c4010d64ac1e5d31a3b706e2989f3b690b5241") signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='/dev/rtc0\x00', 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000340)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000005dc0)) eventfd(0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000005e40)={0xa, 0x0, 0x0, @dev}, &(0x7f0000005e80)=0x1c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006280)={{{@in=@remote, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000006380)=0xe8) 22:00:24 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x200000000001, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 22:00:24 executing program 0: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000080)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab2f304000000cacae1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffff9c) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) 22:00:25 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000f80)=ANY=[@ANYBLOB='+'], 0x1) 22:00:25 executing program 4: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getpid() ustat(0x0, &(0x7f0000000080)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") keyctl$join(0x1, &(0x7f0000000540)) syz_execute_func(&(0x7f0000000740)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5d3c5562b2b0f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:00:25 executing program 2: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f00000000c0), 0x4) 22:00:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'tunl0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000001380)={&(0x7f00000001c0), 0xc, &(0x7f0000001340)={&(0x7f00000012c0)=@ipv6_newaddr={0x54, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x14, 0x2, @loopback}, @IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_CACHEINFO={0x14, 0x6, {0x800, 0x6}}]}, 0x54}}, 0x0) 22:00:25 executing program 1: quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1c5}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0xffffffffffffff62) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000100)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getgroups(0x0, &(0x7f0000000180)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) sched_rr_get_interval(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0928523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460fac1b0030002e363e44d31b31a314b706e205987b7f") accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) 22:00:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sendfile(r0, r0, &(0x7f0000000040), 0x41) 22:00:25 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x84, 0x77, &(0x7f0000000000)={@mcast1}, 0x20) 22:00:25 executing program 4: clock_nanosleep(0xffc99a3a, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000380)) accept4(0xffffffffffffffff, &(0x7f0000000080)=@hci, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:00:25 executing program 3: dup(0xffffffffffffff9c) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x0, &(0x7f00000000c0)}, 0x10) creat(&(0x7f0000000740)='./file0\x00', 0x0) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000d00)={0x77359400}) socket$inet_udplite(0x2, 0x2, 0x88) socket$key(0xf, 0x3, 0x2) connect(0xffffffffffffffff, &(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) writev(0xffffffffffffffff, &(0x7f0000001400), 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @dev}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000140)) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000240)) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0376969ef69dc3641ffaa32233333c4c2958e09c4c275465d4428523044c19086d962788f35c935c97d666466420ff9f279fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") 22:00:25 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x6, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000240)}]) 22:00:25 executing program 5: clock_gettime(0x0, &(0x7f00000002c0)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') dup(0xffffffffffffff9c) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000080)) add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)) keyctl$unlink(0x9, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc484801ee10cec273fefefa467b0c387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3e1b744dbe2e2fb3e3636f7c02c33ffff") 22:00:25 executing program 0: clock_adjtime(0x0, &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs, &(0x7f0000000680)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@mcast2}}}, &(0x7f0000000900)=0x407) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000d80)) stat(&(0x7f0000000e00)='\x00', &(0x7f0000000e40)) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) fstat(0xffffffffffffffff, &(0x7f0000000f80)) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) getgroups(0x0, &(0x7f0000001180)) lsetxattr$system_posix_acl(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='system.posix_acl_access\x00', &(0x7f00000011c0)=ANY=[], 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000340)={'TPROXY\x00'}, &(0x7f0000000380)=0x1e) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000005c0)) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000200)='net/ip_vs\x00') syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 22:00:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="6e7300ecbb4d007c053664a669cec61c879fbbbdb9a0b04381d98d437be45ce0677d9ae679543c797ef7586d20426c68a9b487d57226f6a4d81935a81ea930a68b0045f40d2494c915c28fcde1895ccf6b8e86316532ababa8f9c1546651345600542e3733b5") getdents(r0, &(0x7f0000001100)=""/182, 0xffffffff00000018) 22:00:26 executing program 2: mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000180)=0x7) getgroups(0x0, &(0x7f0000000180)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000080)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000340)={0xa0}, 0xa0) syz_execute_func(&(0x7f0000000400)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:00:26 executing program 1: unshare(0x28020400) unshare(0x22000400) 22:00:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35332de39c5a0000000076412c47ac5fe4b39eda25c7a6c4679681a12b5ccfe44989e5bd61191284410bd1c83ea5f911a70a02dce0d89ae238b5803bfb2943460675d9a01a") fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000005c0), 0x24, 0x0) 22:00:26 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c833, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000000), 0x4) 22:00:26 executing program 1: pipe2(&(0x7f0000000180), 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getgroups(0x0, &(0x7f0000000140)) accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000200)={0x7}, 0x7) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x18) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:00:26 executing program 5: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") socket$netlink(0x10, 0x3, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:00:26 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = epoll_create1(0x0) r2 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) r3 = epoll_create(0x4) r4 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f000000dff4)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000040)) 22:00:27 executing program 4: syz_emit_ethernet(0xfdef, &(0x7f0000000240)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfde1, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0xffffca88}}, @icmp=@parameter_prob={0x8, 0x8, 0x0, 0x0, 0x14, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x70}, @dev}}}}}}, &(0x7f0000000080)) 22:00:27 executing program 0: clock_gettime(0x3, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 22:00:27 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000000040)=""/101, &(0x7f00000000c0)=0x65) 22:00:27 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @remote, @local}, &(0x7f0000000500)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000600)={0x0, @remote, @remote}, &(0x7f0000000640)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @multicast1}, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@multicast2, @multicast2}, &(0x7f0000000800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000940)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a00)={0x0, @loopback, @broadcast}, &(0x7f0000000a40)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a80)={'veth0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in=@local, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000c00)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000f00)={&(0x7f0000000280), 0xc, &(0x7f0000000ec0)={&(0x7f0000000f40)=ANY=[]}}, 0x0) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) getgroups(0x0, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:00:27 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) inotify_add_watch(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x1) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000800)) 22:00:27 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x241, &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000300)=0xfffffffffffffd95) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file1\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in=@loopback, @in=@dev}}, {{@in=@multicast1}}}, &(0x7f0000000140)=0x3f) stat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42568055a072595969ef69dc00d990c8baf6870762c48219467f26d9cb0f38d4c4022d9b65fec19086d9f28fc9430f006b00c422c98c56002b74742e1a1ac441fd50e231a3b786e2989f7f") 22:00:27 executing program 4: pipe(&(0x7f00000034c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) readv(r0, &(0x7f00000025c0)=[{&(0x7f0000001200)=""/213, 0xd5}, {&(0x7f0000003500)=""/4096, 0x1000}], 0x2) 22:00:27 executing program 5: mkdir(&(0x7f0000c4e000)='./file0\x00', 0x0) mount(&(0x7f0000432ff2), &(0x7f00003c9000)='./file0\x00', &(0x7f00000000c0)='configfs\x00', 0x0, &(0x7f0000a06000)) 22:00:27 executing program 5: mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:00:28 executing program 0: r0 = socket$inet(0x2, 0x801, 0x0) mmap(&(0x7f000095a000/0x4000)=nil, 0x4000, 0xfffffffffffffffc, 0x80011, r0, 0x0) 22:00:28 executing program 4: getpid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000440)) gettid() getpgrp(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000001c0)={'bond_slave_1\x00'}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000002c0)=ANY=[], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f0000000040)='eth0selfsystem\x00', 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000001900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003600)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001980)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ac0), &(0x7f0000001b00)=0xc) getuid() getresgid(&(0x7f0000001b40), &(0x7f0000001b80), &(0x7f0000001bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002180)={{{@in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000002280)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000027c0)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000200)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002840)={{{@in=@broadcast, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@remote}}, &(0x7f0000002940)=0xe8) getresgid(&(0x7f0000002980), &(0x7f00000029c0), &(0x7f0000002a00)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={0x0, {{0x2, 0x0, @dev}}}, 0x108) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:00:28 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000000)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) umount2(&(0x7f0000000080)='./file0\x00', 0xd02fba684006eb3c) ioctl$LOOP_SET_FD(r0, 0x4c00, 0xffffffffffffffff) 22:00:28 executing program 2: unshare(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000300)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000600)='/dev/uinput\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) fstat(0xffffffffffffffff, &(0x7f00000018c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001dc0)='cgroup.procs\x00', 0x2, 0x0) gettid() geteuid() lstat(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003500)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000003600)=0xe8) getresgid(&(0x7f0000003640), &(0x7f0000000080), &(0x7f00000036c0)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003700), &(0x7f0000003740)=0xc) stat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003980)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000003a80)=0xe8) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000003c80)='./file0\x00', &(0x7f0000003cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) getuid() getresgid(&(0x7f0000003dc0), &(0x7f0000003e00), &(0x7f0000003e40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) geteuid() stat(&(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000340)={0x0, {{0x2, 0x0, @dev}}}, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syslog(0x0, &(0x7f0000000400)=""/225, 0xe1) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0xa619, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 22:00:28 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pread64(r0, &(0x7f0000000040)=""/57, 0x39, 0x0) 22:00:28 executing program 5: mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffd) keyctl$invalidate(0x15, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:00:29 executing program 3: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x4000000) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:00:29 executing program 1: clock_gettime(0x0, &(0x7f0000000180)) setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)) getpgrp(0x0) getpid() syz_open_procfs(0x0, &(0x7f00000002c0)='net/mcfilter\x00') ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000240)={{0x2, 0x0, @multicast1}, {0x0, @dev}, 0x0, {0x2, 0x0, @rand_addr}, 'bpq0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x0, 0x0, &(0x7f0000000100)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) memfd_create(&(0x7f0000000380)='asymmetric\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) syz_execute_func(&(0x7f0000000080)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f8f49c892c842d85d096b2179660f38302fbae5e5e57545972e0ec4010d64ac1e5d31a3b7e29873bb7f") 22:00:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="2f65786500000000000409004bddd9de91be10ee9ed554fa07424adee9cbc699ec2ca576e50000bcd7a071fb35331ce39c5ad0cf73770bd4246847a1914e4fb0aa9b15eaa94bcd0e700ed63b44338e84ad4ec2f11f6f2adb8dc2fdb18231446f43142ebe700b2231e8fceed6b22a373c9409675ac8d0b53033123fb3037d66241aafe0f880e7a51d1b036ade31d2544d2581fe8653d0cff54369df8c2fce21dcb1cb965669f9a75345ac3479cd51dc7de364c9c272c83ed9e666ca25aad2e7a26e3d6c62d0f8b9065cfca311c06d0744db265aa0e486707c51fd108c0c6ccae6ff42274af94d30fce8836ff9d00bdd") ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000040)) unshare(0x2a000400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0xc020660b, 0x0) 22:00:29 executing program 4: dup(0xffffffffffffff9c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000001700)='@\x00', 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000140)) recvmsg(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000240)=@nl, 0x80, &(0x7f0000000640), 0x0, &(0x7f00000006c0)=""/4096, 0x1000}, 0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local}, &(0x7f0000000080)=0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f00000000c0)={@loopback}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000002c0)) add_key$user(&(0x7f0000001740)='user\x00', &(0x7f0000001780), &(0x7f00000017c0), 0x0, 0xfffffffffffffffe) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 22:00:29 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000000000300000008ae61e4be865500000000000000ff01000000000000000000000000000100000000003c6fb67c7c0e581e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000250c49000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @mcast2}}]}, 0x110) 22:00:29 executing program 2: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_tcp(0xa, 0x1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@dev, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) getuid() fstat(0xffffffffffffffff, &(0x7f0000000340)) geteuid() geteuid() fstat(0xffffffffffffffff, &(0x7f00000003c0)) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000500)) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0)) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 22:00:29 executing program 5: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x0) munlockall() 22:00:30 executing program 5: clock_gettime(0x7, &(0x7f0000000300)) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000001c0), 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000003c0)=""/165) memfd_create(&(0x7f0000000140)='){\x00', 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000cc0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0x5) getresuid(&(0x7f0000003140), &(0x7f0000000dc0), &(0x7f0000000e00)) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getgid() getpid() getgroups(0x0, &(0x7f0000001500)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f00000000c0)='cgroup\x00'}, 0xffffffffffffff92) alarm(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)="03517dddf9702e737461742776d86694d1b8bc669bda106e7e5892028985cc5fc367b38e65d8885b0d353e442cf438b0e30965891f30016e516b4bb400203725abae1a7d731ec7f323f70722f4eb67f04337404c55e83d3d490ecf0354f2946787552d9c8dd9468392d0f79cc195fcf72e6a9e", 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000056c0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000016c0)=0xe8) getresgid(&(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)) 22:00:30 executing program 0: bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, 0x6e) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f00000002c0)=0x398) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xbb, &(0x7f0000000cc0)="1ac77aa0d413eb387a67c20e76a978190d3d8986b502cc5c41dcbbf5766d6e120bd95a686674760935958f8a151e86d7eea5128a15f80c9cc8837d67cf53bcf51be7d31988434e2a6ce2917eaee729cab5caeb2c2448ec075ac1b99dc7b39dc218595911e8e77dfa1e09370a2345c0e2f5dee2cc8b821de4bb3b653e9f46ed9ad90af933dc5b03984d2c2c89b649c4a939eb1733372d91ff18f1fdd5ac05f2a9f383be6f0e850e1edbfe7beb6a938f83da9983dc5200d7ced4080e"}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000780)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) geteuid() lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000900)) getpid() getuid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000980)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000a00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01ee73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b00000021676b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:30 executing program 1: statfs(&(0x7f0000000400)='.\x00', &(0x7f0000000480)=""/145) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000440), 0x0) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000380), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000940)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000900), 0xc, &(0x7f0000000ac0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) getrusage(0x0, &(0x7f0000000700)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000a00)=ANY=[]) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000004bc0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000540)) 22:00:30 executing program 2: unshare(0x20400) preadv(0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x0) 22:00:30 executing program 4: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000080)) socket$unix(0x1, 0x0, 0x0) prctl$void(0x0) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") inotify_init1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) bind$inet6(0xffffffffffffffff, &(0x7f0000000ac0)={0xa, 0x0, 0x0, @local}, 0x1c) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a80)=0x14, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000008c0)={0x0, {{0x2, 0x0, @remote}}}, 0x88) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000200), 0x12) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) getpgid(0x0) 22:00:31 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f00000000c0), 0x4) sendto$inet(r0, &(0x7f0000000000), 0xfe88, 0x0, 0x0, 0xfffffffffffffce9) 22:00:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @mcast1, 0x1f}, 0x1c) 22:00:31 executing program 5: prctl$intptr(0x1d, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') recvmsg(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/244, 0xf4}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000181, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 22:00:31 executing program 0: r0 = socket$inet6(0xa, 0x1080000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = socket$inet(0x2, 0x3, 0x4000000004) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_opts(r1, 0x0, 0x16, &(0x7f00006cdffb), 0x0) 22:00:31 executing program 2: clock_gettime(0x800200008, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) 22:00:31 executing program 0: clock_gettime(0x5, &(0x7f0000000180)) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000640)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000580)=""/172, 0xac}, 0x120) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") sysinfo(&(0x7f0000000ec0)=""/245) accept4(0xffffffffffffff9c, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) 22:00:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) 22:00:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pwrite64(r0, &(0x7f00000000c0), 0x0, 0x0) 22:00:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) 22:00:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_buf(r0, 0x0, 0x21, &(0x7f0000000100), 0x0) 22:00:31 executing program 4: mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000008c0)=ANY=[], 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000140)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000a80)='system.posix_acl_access\x00', &(0x7f0000000ac0), 0x24, 0x0) clock_gettime(0x0, &(0x7f0000000880)) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) getresuid(&(0x7f00000001c0), &(0x7f0000000180), &(0x7f00000003c0)) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0xd4}, 0x28, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$rtc(&(0x7f0000000840)='/dev/rtc#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[], 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)) syz_execute_func(&(0x7f0000000400)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b007f5b92923333420f709427771a69a500e306476bff745c1e1f7f") 22:00:31 executing program 1: clock_gettime(0x5, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000580)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast1}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@rand_addr}}, &(0x7f0000000540)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getegid() fchownat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0) memfd_create(&(0x7f00000000c0)='pids.events\x00', 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000300)={'filter\x00'}, &(0x7f0000000380)=0x54) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:00:32 executing program 3: clone(0x80000, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 22:00:32 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000000)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000500)) 22:00:32 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) dup(0xffffffffffffffff) getpid() 22:00:32 executing program 2: creat(&(0x7f0000000040)='./file1\x00', 0xfffffe) truncate(&(0x7f0000000080)='./file1\x00', 0x3) 22:00:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00004aaffc)=0xfffffffffffffa1c, 0x4) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000040)=0x1ff, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f00000000c0), &(0x7f0000000000)) 22:00:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001740)={&(0x7f0000000080), 0xc, &(0x7f0000001700)={&(0x7f0000001680)=@ipv4_delroute={0x24, 0x19, 0x719, 0x0, 0x0, {}, [@RTA_PRIORITY={0x8}]}, 0xff42}}, 0x0) 22:00:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) sendto$inet(r0, &(0x7f00000000c0)='_', 0x1, 0x0, &(0x7f0000000b00)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240), 0x14) recvfrom$inet(r0, &(0x7f0000000b40)=""/4096, 0x1000, 0x2, 0x0, 0x0) 22:00:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000440)={'ipddp0\x00', 0x2}) 22:00:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='limits\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/250, 0xfa}], 0x1, 0x0) 22:00:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21}, 0x10) sendto$inet(r0, &(0x7f00000000c0)='_', 0x1, 0x0, &(0x7f0000000b00)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000240), 0x14) recvfrom$inet(r0, &(0x7f0000000b40)=""/4096, 0x1000, 0x2, 0x0, 0x0) 22:00:32 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup2(r0, r0) write$P9_RWALK(r1, &(0x7f0000000100)={0x9}, 0x9) 22:00:32 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0)={0x0, 0x1c9c380}, &(0x7f0000000140)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x6e) clock_nanosleep(0x0, 0x0, &(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:00:33 executing program 3: r0 = inotify_init() r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x2a) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f"], 0x1) creat(&(0x7f0000000180)='./file0\x00', 0x0) 22:00:33 executing program 1: epoll_create(0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000140)={0x12509e3bf4d420d4}, 0x7) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000300)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) getuid() stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@mcast2, @in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002940), &(0x7f0000002980)=0xc) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002dc0), &(0x7f0000002e00)=0xc) getegid() lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) fstat(0xffffffffffffffff, &(0x7f0000002f00)) geteuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c740)={{{@in, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000079c0)=0x1000002c3) fstat(0xffffffffffffffff, &(0x7f0000003340)) lstat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003400)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003500), &(0x7f0000003540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003700)=0xe8) getresgid(&(0x7f0000003740), &(0x7f0000003780), &(0x7f00000037c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007500)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000007600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000007640)) geteuid() 22:00:33 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) dup(0xffffffffffffffff) getpid() 22:00:33 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x8000000000000, &(0x7f0000ff9000/0x4000)=nil) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)='oom_adj\x00'}, 0x18) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) futex(&(0x7f0000000400), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000480)) pipe2(&(0x7f0000000340), 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) keyctl$revoke(0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:00:33 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x2, @random="f8bf88df5b1b", @remote, @dev, @rand_addr=0xac1414bb}}}}, &(0x7f0000000040)) 22:00:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000001c0)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, &(0x7f0000000000), &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff01000000"]}, 0xe0) 22:00:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r1, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 22:00:33 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200), &(0x7f0000000300)="747275737465642e6f7665726c61792ec3b96171756500", 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) truncate(&(0x7f0000000400)='./file0\x00', 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000140)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000006c0)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) connect(0xffffffffffffffff, &(0x7f0000000340)=@xdp, 0xfffffffffffffebf) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000700)=0x14) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) syz_execute_func(&(0x7f0000000640)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:33 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mkdir(&(0x7f0000002a80)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000180)={0x5, 0x4, 0xcc, 0x7, 0xffffffff, 0x1, 0x8000, 0x8001, 0x1, 0xda}) mount(&(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0)=[{0xa}, {0x4, 0x3ff}, {0x4, 0x1441b191}, {0x84802f27d45d835a, 0x6}, {0x2, 0x1}, {0xf, 0x4}, {0x8, 0x2}], 0x7) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20043, 0x0) [ 228.495807] audit: type=1400 audit(1537308033.257:52): avc: denied { setpcap } for pid=14881 comm="syz-executor4" capability=8 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 22:00:33 executing program 4: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) 22:00:33 executing program 5: getresuid(&(0x7f0000000340), &(0x7f0000000440), &(0x7f0000000480)) syslog(0x0, &(0x7f0000000600)=""/177, 0xb1) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file1\x00', 0x0, 0x0) utime(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) delete_module(&(0x7f00000006c0)='GPL\x00', 0x0) getitimer(0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") writev(0xffffffffffffffff, &(0x7f0000000780), 0xe49) utimes(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x77359400}, {0x77359400}}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=@ipv4_getnetconf={0x14}, 0x14}}, 0x0) mkdir(&(0x7f0000000840)='./file0\x00', 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 22:00:33 executing program 4: waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000480)) clock_settime(0x0, &(0x7f0000000600)) sync() eventfd2(0x0, 0x0) epoll_create1(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xfdf8) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002525662b1f1f993d233d234142d85d09660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x44) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000200)={0x0, 'syz_tun\x00'}, 0x18) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001500)) geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001840)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) 22:00:34 executing program 1: r0 = inotify_init1(0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)) 22:00:34 executing program 3: munlockall() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) ioprio_get$pid(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f00000006c0)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f00000006c0)) truncate(&(0x7f0000000180)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 22:00:34 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) dup(0xffffffffffffffff) getpid() 22:00:34 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000580)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000140)=0xc) getgid() getegid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x50, &(0x7f0000000340)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000002c0)='ramfs\x00'}, 0x30) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000200)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000240)) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000700)="260fd4db805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be279c482fd07581fe54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b4980b5fc3") 22:00:34 executing program 5: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) gettid() geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev, @in=@broadcast}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002880)={{{@in=@broadcast, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002980)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a00)) lstat(0xffffffffffffffff, &(0x7f0000002a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002b80)) stat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getpid() getresuid(&(0x7f0000006240), &(0x7f0000006280), &(0x7f00000062c0)) lstat(&(0x7f0000006300)='./file0\x00', &(0x7f0000006340)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000063c0), &(0x7f0000006400)=0xc) stat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000007840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007880), &(0x7f00000078c0)=0xc) lstat(&(0x7f0000007900)='./file0\x00', &(0x7f0000007940)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:34 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000140)={"62726964676530000000008000", &(0x7f0000000080)=@ethtool_cmd={0x6, 0x0, 0x709000}}) 22:00:34 executing program 1: pipe(&(0x7f0000000240)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000480), &(0x7f0000000140)=0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) utime(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) pipe2(&(0x7f0000000340), 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) getegid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000980)=0xe8) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000000e40)=0xffffffffffffffdf) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001040)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000001140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getgid() gettid() lstat(&(0x7f0000002840)='./file0/file0\x00', &(0x7f0000002880)) getgroups(0x0, &(0x7f0000002900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xc) lstat(&(0x7f0000002d80)='./file0\x00', &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002ec0)) getuid() getgid() gettid() fstat(0xffffffffffffffff, &(0x7f0000003180)) getgroups(0x0, &(0x7f0000003200)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003240), &(0x7f0000000040)=0xc) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:00:34 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f00000035c0), 0x0, 0x0, &(0x7f00000036c0)) dup(0xffffffffffffff9c) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000480)="b30000000026d5", 0x0) openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:00:34 executing program 4: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:35 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0xfffffffffffffffe}) 22:00:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = syz_open_procfs(0x0, &(0x7f0000000200)='status\x00') rt_sigaction(0x2a, &(0x7f0000000080)={0xfffffffffffffffe}, &(0x7f00000000c0), 0x8, &(0x7f0000000100)) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000240)=""/4096, 0x88}], 0x1) readv(r1, &(0x7f0000000580), 0x3c1) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000001280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f0000001240)={&(0x7f0000000180)={0x68, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040090) 22:00:35 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f0000360000)="2400000052001f0014f9f407002c04000a00071008000100feffffff0800000000000000", 0x24) 22:00:35 executing program 5: getpgid(0xffffffffffffffff) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000003c0)=""/192) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000002c0)=0xc) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000480)) memfd_create(&(0x7f0000000280)='!\x00', 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000200), &(0x7f0000000240)=0x8) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 22:00:35 executing program 3: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={{0x77359400}}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6}}, 0xe8) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)}, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) rename(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) getpgrp(0x0) rt_sigpending(&(0x7f0000000140), 0xfffffffffffffd45) ptrace(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) utimensat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x77359400}}, 0x0) 22:00:35 executing program 1: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000001d00)='net/rfcomm\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d80)=0x14) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f00000016c0)) getgroups(0x0, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000000080)) getresgid(&(0x7f00000013c0), &(0x7f0000000180), &(0x7f0000000280)) geteuid() getgroups(0x0, &(0x7f0000001480)) timerfd_create(0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000014c0)='cgroup.type\x00', 0x2, 0x0) stat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002ec0)={{{@in6, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000002fc0)=0x2d0) fstat(0xffffffffffffffff, &(0x7f0000003000)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000003100)) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 22:00:35 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) dup(0xffffffffffffffff) getpid() 22:00:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000001c0), &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000040)) 22:00:35 executing program 2: epoll_create1(0x0) getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) write$P9_RLINK(0xffffffffffffffff, &(0x7f00000000c0)={0x7}, 0x7) 22:00:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='\b'], 0x1) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)={'security\x00', 0x1, '*'}, &(0x7f0000000000)=0x25) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000002b00), 0x185, &(0x7f0000002b80)=""/62, 0xa4}}], 0x5e2, 0x0, 0x0) 22:00:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='\b'], 0x1) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)={'security\x00', 0x1, '*'}, &(0x7f0000000000)=0x25) recvmmsg(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000002b00), 0x185, &(0x7f0000002b80)=""/62, 0xa4}}], 0x5e2, 0x0, 0x0) 22:00:35 executing program 4: r0 = socket$packet(0x11, 0x200000000000000a, 0x300) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, 0x0) 22:00:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=@dstopts, 0x8) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000100)=""/110, &(0x7f00000001c0)=0x6e) 22:00:36 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r1, &(0x7f0000000540)=""/132, 0xffffffffffffff13) 22:00:36 executing program 5: clock_settime(0x0, &(0x7f0000000040)={0x77359400}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) gettid() clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/connector\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getresgid(&(0x7f0000001900), &(0x7f0000001940), &(0x7f0000001980)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001a00)) fstat(0xffffffffffffffff, &(0x7f0000001a40)) getpid() getresgid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)) times(&(0x7f0000000680)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000440)={'ip_vti0\x00', {0x2, 0x0, @local}}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001f00)) syz_execute_func(&(0x7f0000000340)="c4c1815e943fe2a12441c4e1f917a6000000000f5a3bc44125d8cbc4213d6c9efeefffffc4036d7c4c7c3572c48179e63ef26df0472979cac463757da10a00000000") 22:00:36 executing program 3: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6=@remote}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000020feffff7a0af0fef8ffffff79a4f0ff00000000b7060000000000012d6405000000000065040400010000000704000000300000b7050000000000006a0a00fe02000000850000001a000000b700000000000000953b000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 22:00:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x0, @local}}, 0x0, 0x4, 0x0, "940fc1caee9bc7cf5e785533ab29ad3d2d0990b2389f315e28a2223e990b248d6f70276e5f45fd25ce6d71c8f7cf7aed1f3b5759fb09e07da1ec04037a41f7b4aae0dc9e4f359063dedf0c669e97b277"}, 0xd8) connect$inet(r0, &(0x7f0000000040), 0x10) 22:00:36 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000b40)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f00000009c0)=@ipv4_newroute={0x1c, 0x18, 0xc01, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1}}, 0xd5}}, 0x0) 22:00:36 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000240)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_tgsigqueueinfo(r1, r1, 0x34, &(0x7f0000000040)={0x0, 0x0, 0xffeffffffffffffc}) ptrace$setregset(0x4205, r1, 0x0, &(0x7f0000000000)={&(0x7f0000000140)}) 22:00:36 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) dup(0xffffffffffffffff) 22:00:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000001c0), 0x4) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffd) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) 22:00:36 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) lseek(r0, 0x0, 0x4) 22:00:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) connect$inet(r0, &(0x7f0000000280), 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[{}, {}, {}, {}], 0x2217) 22:00:36 executing program 5: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@l2, &(0x7f0000000400)=0x614, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") 22:00:36 executing program 1: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f00000008c0)=0x4) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000007c0), 0xc) bind(0xffffffffffffffff, &(0x7f0000000b80)=@l2, 0xffffffffffffffb9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) lchown(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:00:37 executing program 4: prctl$void(0x800000003) pipe2(&(0x7f0000000280), 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)={'#! ', './file0'}, 0xb) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000003c0)="42805da0ad5252ef84dc0f0f00b4ce67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f3802de0a0d0d5ec4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:00:37 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:37 executing program 3: syslog(0x0, &(0x7f0000000040)=""/15, 0xf) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") socket$inet6_udp(0xa, 0x2, 0x0) 22:00:37 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x0, &(0x7f00000003c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000480)) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c80)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000002d80)=0xe8) getgroups(0x0, &(0x7f0000002dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002e00)) fstat(0xffffffffffffffff, &(0x7f0000002e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002f40)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003040)=0xe8) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)) fstat(0xffffffffffffffff, &(0x7f0000003180)) getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000032c0)={{{@in6=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) lstat(&(0x7f0000003400)='./file0\x00', &(0x7f0000003440)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003680), &(0x7f00000036c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003a00)) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000046c0)={{{@in6=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000047c0)=0xe8) getgroups(0x0, &(0x7f0000004800)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004840)='\x00'}, 0x30) getresuid(&(0x7f00000048c0), &(0x7f0000004900), &(0x7f0000004940)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000049c0)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@multicast1}}, &(0x7f0000004ac0)=0xe8) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b00)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004c00)=0xe8) stat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004d40)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000004e40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004f00)) lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006380), &(0x7f00000063c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000006400)) getresuid(&(0x7f0000006500), &(0x7f0000006540), &(0x7f0000006580)) lstat(&(0x7f00000065c0)='./file0\x00', &(0x7f0000006600)) fcntl$getown(0xffffffffffffffff, 0x9) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:00:37 executing program 2: r0 = timerfd_create(0x0, 0x0) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', '%\x00'}, &(0x7f0000000140), 0x0) 22:00:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x2, 0x4) connect$inet(r0, &(0x7f0000000080), 0x10) sendto$inet(r0, &(0x7f0000000000)='_', 0x1, 0x0, &(0x7f0000000b00)={0x2, 0x0, @loopback}, 0x10) recvfrom$inet(r0, &(0x7f0000000b40)=""/4096, 0x1000, 0x2, 0x0, 0x0) 22:00:37 executing program 1: getitimer(0x1, &(0x7f0000000200)) pipe2(&(0x7f0000000140), 0x0) sched_yield() setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000780), 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000500)=""/62) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@generic) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da0be0fef69dc0f01eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f06ebab204000000cac441795b64ae01dae5f3460f58f975450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6, @in6}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000f40)=0xe8) getgroups(0x0, &(0x7f0000000180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) getgroups(0x0, &(0x7f00000025c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getpgrp(0x0) geteuid() getgroups(0x0, &(0x7f0000002840)) getresuid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getgroups(0x0, &(0x7f00000029c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004180)) 22:00:37 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8921, &(0x7f00000001c0)='bond0\x00') 22:00:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x0, 0x2b, [], 0x0, &(0x7f00000001c0), &(0x7f0000000080)=""/43}, &(0x7f0000000340)=0x78) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000300), 0x1b5, &(0x7f0000000600)}}], 0x2, 0x0) 22:00:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'rose0\x00'}) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x0) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 22:00:37 executing program 5: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, &(0x7f00000004c0)=']#\x00') getitimer(0x0, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000440)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) setrlimit(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000900)=ANY=[], 0x0) pipe(&(0x7f0000000400)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000380)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000500)) inotify_init1(0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='threaded\x00', 0x9) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:37 executing program 2: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) gettid() geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev, @in=@broadcast}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002880)={{{@in=@broadcast, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002980)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a00)) lstat(0xffffffffffffffff, &(0x7f0000002a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002b80)) stat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:38 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000540)) uname(&(0x7f0000000040)=""/109) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x44) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000580)) clock_gettime(0x0, &(0x7f00000006c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000007c0)) pipe(&(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000780)={0x0, &(0x7f0000000700)}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'veth0_to_bridge\x00'}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000640)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000680)=0x10) memfd_create(&(0x7f0000000380)="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", 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000005c0), &(0x7f0000000600)=0x8) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000800)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000ec0)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000000c0)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) 22:00:38 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) readahead(r0, 0x0, 0x0) 22:00:38 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:38 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000000040), 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), 0x4) recvmsg(r0, &(0x7f0000002300)={&(0x7f00000021c0)=@can, 0x80, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=""/86, 0x35}, 0x4040002124) 22:00:38 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@local, @in6=@local}}, {{@in6=@local}, 0x0, @in=@broadcast}}, 0xe8) poll(&(0x7f00000002c0)=[{}], 0x70, 0xfffffffffffffc01) 22:00:38 executing program 2: unshare(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c00)="122f6367726f75702e6370752f73797a76b164c24fa4f4fc63bc7b1d543100", 0x200002, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000300)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000600)='/dev/uinput\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0x11a) stat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000580)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f00000007c0), &(0x7f0000000500), &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f00000018c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001dc0)='cgroup.procs\x00', 0x2, 0x0) gettid() geteuid() lstat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000700)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003500)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000003600)=0xe8) getresgid(&(0x7f0000003640), &(0x7f0000003680), &(0x7f0000000140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003700), &(0x7f0000003740)=0xc) stat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000800)=0x6) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003980)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000003a80)=0xe8) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004340)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000003c80)='./file0\x00', &(0x7f0000003cc0)) getuid() getresgid(&(0x7f0000003dc0), &(0x7f0000003e00), &(0x7f0000003e40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) geteuid() stat(&(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fefe9dcf30f581bce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:38 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x3ef, &(0x7f0000001fc0), 0xb}}], 0x4000000000003f0, 0x0) 22:00:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x6, 0x31, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8905, &(0x7f0000000080)) 22:00:38 executing program 1: r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x2711, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xfec3) 22:00:38 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) select(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0x7}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)='rxrpc_s\x00'}, 0x30) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/34) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0/file0\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sched_getattr(0x0, &(0x7f0000000300), 0x30, 0x0) getgroups(0x0, &(0x7f0000000600)) socket$nl_netfilter(0x10, 0x3, 0xc) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000500)={0x18}, 0x18) sendmmsg(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:00:38 executing program 1: times(&(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000080)=0xc) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) openat$random(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/urandom\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpin6, &(0x7f00000001c0)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)={@loopback}, &(0x7f00000002c0)=0x14) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000280)=0x447) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fchdir(0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd460fb8211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 22:00:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000001280)={&(0x7f0000001040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000001140), 0x0, &(0x7f0000001180)=""/216, 0xd8}, 0x0) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='s'], 0x1) close(r0) 22:00:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000040)) 22:00:39 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getpid() ioprio_get$pid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000040)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f5417545844d4dbc2ebcad64ac1e46d9f8e37f") 22:00:39 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:39 executing program 1: clock_getres(0x40020004, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01fecf73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f3a1dfd1a2f8000000006b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") clock_gettime(0x0, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000440)='mountstats\x00') getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000d80)={@loopback, @remote}, &(0x7f0000000dc0)=0xc) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, 0xe8) dup(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={"000400", {0x2, 0x0, @multicast2}}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000140)) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000200)={0x0, 'veth1_to_bond\x00'}, 0x18) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000e00)) openat$zero(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001100)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001140)={{{@in=@local, @in=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001240)=0xe8) stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001380), 0x4) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000014c0)=0xe8) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001500)) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) getgroups(0x0, &(0x7f0000001600)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000001740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) 22:00:39 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000140)) 22:00:39 executing program 2: keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000540)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@rand_addr, @in=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getgid() prctl$getname(0x10, &(0x7f0000000580)=""/169) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000340), 0xffffffffffffff09) 22:00:39 executing program 4: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000380)=ANY=[], 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:00:39 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) sched_getparam(0x0, &(0x7f00000002c0)) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000300), 0x4) getpgid(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x2a1}) syncfs(0xffffffffffffffff) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@multicast1, @in6}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xfffffffffffffdfd) clock_gettime(0x0, &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) getgroups(0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) socket$inet(0x2, 0x0, 0x0) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000500), 0x0, 0x0, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000700)=ANY=[], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000005cc0), 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000040)=@un=@abs, &(0x7f00000000c0)=0x80) 22:00:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001140)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000180)) 22:00:40 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLOCK(r1, &(0x7f00000001c0)={0x8}, 0x5df) 22:00:40 executing program 5: memfd_create(&(0x7f0000000380)='\x00', 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, 0x6e) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000002c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xbb, &(0x7f0000000cc0)="1ac77aa0d413eb387a67c20e76a978190d3d8986b502cc5c41dcbbf5766d6e120bd95a686674760935958f8a151e86d7eea5128a15f80c9cc8837d67cf53bcf51be7d31988434e2a6ce2917eaee729cab5caeb2c2448ec075ac1b99dc7b39dc218595911e8e77dfa1e09370a2345c0e2f5dee2cc8b821de4bb3b653e9f46ed9ad90af933dc5b03984d2c2c89b649c4a939eb1733372d91ff18f1fdd5ac05f2a9f383be6f0e850e1edbfe7beb6a938f83da9983dc5200d7ced4080e"}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getegid() getpid() getresgid(&(0x7f00000006c0), &(0x7f0000000580), &(0x7f00000003c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffffff, 0x0, 0x1b7, &(0x7f0000000780)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) geteuid() lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000900)) getpid() getuid() stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000d80)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01ee73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b00000021676b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000140)={'ip_vti0\x00'}) 22:00:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)) r2 = syz_open_pts(r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) 22:00:41 executing program 3: r0 = socket$inet6(0xa, 0x100000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'bond0\x00', &(0x7f0000000100)=@ethtool_cmd={0x2c}}) 22:00:41 executing program 2: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:00:41 executing program 1: inotify_init() lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000240)) getgroups(0x0, &(0x7f0000000180)) fchown(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f0000000380)='proc:!GPL\x00', 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) syslog(0x0, &(0x7f0000000600)=""/177, 0xb1) clock_gettime(0x0, &(0x7f0000000300)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000480), 0x0) creat(&(0x7f0000000200)='./file1\x00', 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0373666450fdc640a0cffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f2e2e668101280f75629475629479fbc463fd7998b400ba000079aaff43d0e156010d64ac1e5d31a314b706e20598670f4643af2a") sysinfo(&(0x7f0000000040)=""/19) clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000440), 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000080), 0xb) 22:00:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5, 0x9, 0x7, 0xfffffffffffffffe}, 0x2c) 22:00:41 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:41 executing program 5: socket$inet6(0xa, 0x100004, 0x0) fchdir(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'vlan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0be0fef699c0f01fecfc4e161763fd69d0fe00ff01af3f0817e768cc80000000081b5e5bc2b0000002167660f382a6b00641c7366776643d5c7a169e985fe5e000075450f2e1ac4010d64ac1e5d31a3b744dbe2c4a1c95fbf9222a25c0703") 22:00:41 executing program 4: getrusage(0xffffffffffffffff, &(0x7f00000009c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@dev}, &(0x7f00000006c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0bd0fef69dc66420f38383ece73fe19fa380f38211af3f0817e768cc80000008081b5e5bc2b0000002167f00fbab204000000ca6b2179f2a5e5410f4135894d00000f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:00:42 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)=""/174, &(0x7f00000000c0)=0xae) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x0) flock(0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000800), 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000180)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000500)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455d2ebc2ebc0d64ac1edde3e37f") 22:00:42 executing program 2: r0 = memfd_create(&(0x7f0000000e40)="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", 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e000000000000000000000000004000000000000000000000000000000000000008000038"], 0x37) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000001c0), &(0x7f00000001c0), 0x1000) 22:00:42 executing program 1: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'vlan0\x00', &(0x7f0000000140)=@ethtool_stats}) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) getgid() bind(0xffffffffffffffff, &(0x7f0000000540)=@sco, 0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 22:00:42 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:42 executing program 2: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@mangle={'mangle\x00', 0x1f, 0x6, 0x588, 0x1fc, 0x0, 0x1fc, 0x0, 0x480, 0x61c, 0x61c, 0x61c, 0x61c, 0x61c, 0x6, &(0x7f00000001c0), {[{{@uncond, 0x0, 0xc8, 0xec}, @inet=@DSCP={0x24, 'DSCP\x00'}}, {{@ipv6={@local, @local, [], [0xffffff00, 0xffffffff, 0xffffffff], 'bridge0\x00', 'ip6gretap0\x00'}, 0x0, 0xc8, 0xec}, @inet=@TOS={0x24, 'TOS\x00'}}, {{@ipv6={@loopback, @loopback, [], [], 'veth0_to_team\x00', 'ip6gretap0\x00', {}, {}, 0x0, 0x0, 0x5}, 0x0, 0xc8, 0x10c}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv4=@remote, 0x0, 0x7}}}, {{@ipv6={@ipv4={[], [], @local}, @loopback, [], [], 'tunl0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc8, 0xec}, @inet=@DSCP={0x24, 'DSCP\x00'}}, {{@uncond, 0x0, 0xc8, 0xec}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x5e4) 22:00:42 executing program 3: keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') pwrite64(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 22:00:42 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) epoll_create1(0x0) getpid() openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000840)=""/223) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) pivot_root(&(0x7f00000000c0)='./file0/../file0/file0\x00', &(0x7f00000005c0)='./file1\x00') truncate(&(0x7f00000002c0)='./file0/file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000200), 0x10) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) getrlimit(0x0, &(0x7f0000000280)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:00:42 executing program 2: clock_gettime(0x0, &(0x7f0000000b40)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080), &(0x7f00000000c0)="656d31656d316e6f64657640656d31fd776c616e304000", 0xfffffffffffffffd) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000300)=0xc) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0cb0fef69dc0f01ee40dfe073fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca31c4547d0f0303410f57deac75450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") 22:00:42 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:43 executing program 1: gettid() syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_mr_vif\x00') ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) utime(&(0x7f00000018c0)='./file0\x00', &(0x7f0000000480)) pipe2(&(0x7f0000001840), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in=@broadcast, @in6=@remote}}, {{@in6}}}, &(0x7f0000001a80)=0xe8) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001ac0)={0x0, 0x1, 0x6, @remote}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x0, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x0, 0x4, &(0x7f0000000040)={0x77359400}, &(0x7f00000003c0), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001b80)="42805da0bd0fef69dc0f01eece738c19fa380f3821c402f5ac10f0817e768cc80000000064660f5970fef00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") 22:00:43 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:43 executing program 5: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x8000000000000, &(0x7f0000ff9000/0x4000)=nil) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)='oom_adj\x00'}, 0x18) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) futex(&(0x7f0000000400), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000480)) pipe2(&(0x7f0000000340), 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:00:43 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f0000000140), 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000080)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000003640)=""/135, &(0x7f0000003580)=0x87) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) clock_adjtime(0x0, &(0x7f00000004c0)) setrlimit(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:43 executing program 2: chdir(&(0x7f00000003c0)='./file0\x00') keyctl$set_reqkey_keyring(0x5, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000240)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) dup(0xffffffffffffffff) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000340)={{0x77359400}, {0x77359400}}, &(0x7f0000000380)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) geteuid() getgroups(0x0, &(0x7f0000000500)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) gettid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e40), &(0x7f0000001e80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) getresgid(&(0x7f0000001f40), &(0x7f0000001f80), &(0x7f0000001fc0)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 22:00:43 executing program 1: r0 = socket$inet(0x2, 0x801, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/20, 0x14}, 0x0) 22:00:43 executing program 5: flistxattr(0xffffffffffffffff, &(0x7f0000000140)=""/150, 0x96) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000000400), &(0x7f0000000580)}}, &(0x7f0000000640)) timer_create(0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000700)) timer_create(0x0, &(0x7f0000000800), &(0x7f0000000840)) timer_gettime(0x0, &(0x7f0000000880)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000300)=""/243, 0xf3, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0c3a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d3123b744dbe2440fc72326f00fbb9500000000") 22:00:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') pread64(r0, &(0x7f00000001c0)=""/22, 0x16, 0x56) 22:00:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"00ac720000000000ec973f820f7c4000", 0x102}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000000)) 22:00:44 executing program 1: getrusage(0x0, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000600)) getpid() alarm(0x0) clock_getres(0x0, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") gettid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getpgid(0x0) getpgrp(0x0) clock_gettime(0x0, &(0x7f0000002dc0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)) clock_settime(0x0, &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') 22:00:44 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9f, 0xa}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x41300}, 0x48) 22:00:44 executing program 2: socketpair(0x18, 0x0, 0x2, &(0x7f0000000140)) 22:00:44 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:44 executing program 4: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1}, @icmp=@source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @rand_addr}}}}}}, &(0x7f00000004c0)) 22:00:44 executing program 4: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmsg(r0, &(0x7f0000000000)={&(0x7f00000037c0)=@in6={0xa, 0x4e24, 0x800, @dev}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000280)=[{0x28, 0x29, 0x2, "86676176da0e6928a33d2f03f6aef2fca1"}], 0x28}, 0x0) 22:00:44 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup3(r0, r1, 0x0) getpeername$unix(r2, &(0x7f0000000380), &(0x7f00000004c0)=0x6e) 22:00:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x1, 0x40000000000008, 0x7, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000080), &(0x7f0000000100)=""/143}, 0x18) 22:00:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000013000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000004980)=[{{&(0x7f0000000000)=@l2, 0x80, &(0x7f0000001440), 0x0, &(0x7f00000014c0)=[{0x10}], 0x10}}], 0x1, 0x811) 22:00:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 22:00:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:00:44 executing program 2: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) dup(0xffffffffffffffff) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:00:44 executing program 1: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='tunl0\x00', 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") write(r0, &(0x7f0000000900)="89", 0x1) sendto$inet(r0, &(0x7f00000003c0), 0xfffffdef, 0x1f4, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 22:00:44 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:44 executing program 3: futex(&(0x7f00000000c0), 0x4, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000600)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000008c0)="428055a0956969ef69dc00d91b69053737c3397c2a060f38211ac4c2f12bf364a70f157a9e400f01efd9f4417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 22:00:44 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x3b, 0x4, @tid=r1}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000240)) timer_gettime(0x0, &(0x7f00000001c0)) rt_sigtimedwait(&(0x7f00000000c0)={0xfffffffffffffffd}, &(0x7f0000d31ff0), &(0x7f0000000100)={0x77359400}, 0x8) 22:00:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @multicast2}, {0x0, @broadcast}, 0xfffffffffffffffd, {0x2, 0x0, @local}, 'sit0\x00'}) 22:00:45 executing program 5: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) epoll_create1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x3c, 0x7d, 0x0, {0x0, 0x35, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, "", 0x0, "", 0x0, "", 0x2, '{)'}}, 0x3c) clock_gettime(0x0, &(0x7f00000001c0)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000680)='{)'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6, @in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000800)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380), &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000640), &(0x7f00000006c0)='filter\x00', 0xfffffffffffffffc) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000004c0)={0x20}, 0x20) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000280)=@add_del={0x2, &(0x7f0000000240)='rose0\x00'}) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x1, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0c60fef69dc36f20f78d30c0ace73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:45 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) pipe2$9p(&(0x7f0000000040), 0x0) pipe(&(0x7f0000000100)) utime(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)) getpgid(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000540)=0xff61) socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000580)='./file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) pipe2$9p(&(0x7f0000000180), 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000005c0)=""/250) syz_open_procfs(0x0, &(0x7f0000001d00)='net/rfcomm\x00') 22:00:45 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:45 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000300), 0x4) 22:00:45 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000015ff8)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x1a, &(0x7f0000abaff9)={0x3, 0xfff}, 0x10) 22:00:45 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x806, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x8, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x5c}, @dev}}}}}}, &(0x7f0000000140)) 22:00:45 executing program 1: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3, 0x3) 22:00:45 executing program 5: prctl$void(0x800000003) pipe2(&(0x7f0000000280), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000003c0)="42805da0ad5252ef84dc0f0f00b4ce67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f3802de0a0d0d5ec4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:00:45 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) 22:00:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000000), 0x4000000000000fe, 0x0) 22:00:45 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9a772556ad7057ca805a300b1fd63170100000010eeafda75af1f02ac06edbcd7a093fb35331ce39c5a00000000") fsetxattr(r0, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f0000000080)='\x00', 0x1, 0x3) 22:00:45 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000400)=""/86) 22:00:45 executing program 4: futex(&(0x7f0000000040), 0x0, 0x1, &(0x7f0000000080)={0x77359400}, &(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:00:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r0, &(0x7f0000014fc8)={&(0x7f0000006ff0)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a40), 0x0, &(0x7f000001ef80)=ANY=[@ANYBLOB="2000000000000000000000000700000044105dd4c811d815cd70000000000000"], 0x20}, 0x0) 22:00:46 executing program 2: gettid() wait4(0x0, &(0x7f0000000140), 0x0, 0x0) getrandom(&(0x7f0000000580)=""/148, 0x524569fcda98af28, 0x3) memfd_create(&(0x7f0000001bc0)="776c616e5a52f9807e8c312d7b402173656c667179", 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000200)={0xbdfc376fda3cc763}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f00000001c0)='\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:00:46 executing program 5: chroot(&(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='security.apparmor\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getegid() dup2(0xffffffffffffffff, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000002f80)) recvmmsg(0xffffffffffffffff, &(0x7f0000002d80), 0x0, 0x0, &(0x7f0000002fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003000)={{{@in=@remote, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000003100)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003140), &(0x7f0000003180)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000005c40), 0x0, 0x0, &(0x7f0000005e00)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005e40)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000005f40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000060c0)={{{@in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000061c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006240)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006340)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000006380)={'gretap0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000063c0)={{{@in6=@remote, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000064c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006500), &(0x7f0000006540)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000006580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000065c0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000006600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000079c0)={{{@in6=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000007ac0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000007c00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007cc0)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000007dc0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f5835c9356b7dae7dae0779fbc463fd7998b400ba000079aaff43d0e146010d64ac1e5d31a314b706e205987b7f") 22:00:46 executing program 4: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000480)) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c40)) getgroups(0x0, &(0x7f0000002dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) fstat(0xffffffffffffffff, &(0x7f0000002e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002f40)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003040)=0xe8) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) fstat(0xffffffffffffffff, &(0x7f0000003180)) getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000032c0)={{{@in6=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xfffffffffffffe6f) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000003440)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003680), &(0x7f00000036c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003a00)) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000046c0)={{{@in6=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000047c0)=0xe8) getgroups(0x0, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004880)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000200)="2520ea7b6be4f03d01"}, 0x30) getresuid(&(0x7f00000048c0), &(0x7f0000004900), &(0x7f0000004940)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000049c0)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@multicast1}}, &(0x7f0000004ac0)=0xe8) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b00)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004c00)=0xe8) stat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d00)) fstat(0xffffffffffffffff, &(0x7f0000004e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004f00)) geteuid() lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006380), &(0x7f00000063c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000006400)) getresuid(&(0x7f0000006500), &(0x7f0000006540), &(0x7f0000006580)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000007c00)=0xc) geteuid() getegid() getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@local, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0x132) getgroups(0x0, &(0x7f0000007d80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007dc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da097c4e1bdd094d7fdffffffc4a17858a9c0000000cec273fefefa387c36674d0f5714b6b681768cc8000000c481b5e5bc2b00000021c403996f3f0e6b2179c4417567bb00203333e5336a416742df15850a6bef00000f2e1ac4010d64ac1e5d31a3b744dbe20471fb63fbaf") 22:00:46 executing program 1: close(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000840)) getpgrp(0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) socket$unix(0x1, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000680)='/dev/null\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000007c0)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000800)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000480)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000640)=0xe8) getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) getgroups(0x0, &(0x7f0000000a40)) stat(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000ac0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000d40), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000006c0)=ANY=[], &(0x7f0000000740)) getgroups(0x0, &(0x7f00000004c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:46 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x0, &(0x7f0000000000)) fgetxattr(r0, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:47 executing program 3: futex(&(0x7f0000000280), 0x3, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000180)='\x00'}, 0x30) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000200)={0x29c}, 0x28) 22:00:47 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="2e2f6367726f75700000000000db887974a9d4b8049e206606a808fcfe3dd31291f786cee92a2ed9cc0eeb0f6e1b21700557d7d321c616f2a69f975e5d5807683103cf48516fd96063603193e1cc3109ac8eeb3489d6a5d86eea6fc66adc6c92378d49", 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000240)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000180)=""/103, 0x10000000d) 22:00:47 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000002800)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)=""/109, 0x6d}], 0x1, &(0x7f0000001800)=""/4096, 0x1000}, 0x0) socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000180)=""/188, 0xbc) 22:00:47 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(&(0x7f0000000000)=""/17, 0xfd2a) 22:00:47 executing program 2: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) getuid() getgid() getpid() lstat(&(0x7f0000000240)='.\x00', &(0x7f0000000080)) unlink(&(0x7f0000000180)='./file0\x00') open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000280), 0x8, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getgid() getgroups(0x0, &(0x7f0000000200)) 22:00:47 executing program 5: ftruncate(0xffffffffffffffff, 0x0) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@mcast1}, &(0x7f0000000240)=0x3bd) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:00:47 executing program 4: clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0x10) epoll_create(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) readahead(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @broadcast, @remote}, &(0x7f0000000640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @empty, @multicast1}, &(0x7f0000000cc0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@remote, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001600)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001640)=@xdp, &(0x7f00000016c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000019c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001a40)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a80)={{{@in=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001e00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002580)={'ifb0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005b00)={{{@in=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000005c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005d00)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006500)={&(0x7f0000000500), 0xc, &(0x7f00000064c0)={&(0x7f0000005d40)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f00000005c0)="408055a03769ef69dc3641ffaa743223333333c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000240)) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") 22:00:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[0x7], [], @multicast2}}, 0x1c) 22:00:47 executing program 1: clock_gettime(0x4000000000009, &(0x7f0000000500)) openat$zero(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@multicast1, @in=@dev}}, {{@in6=@local}}}, &(0x7f0000000400)=0xe8) add_key(&(0x7f0000000680)='keyring\x00', &(0x7f00000006c0), &(0x7f0000000780), 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000980)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000200)) umount2(&(0x7f0000000340)='./file0\x00', 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) openat$full(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000480)) syslog(0x0, &(0x7f0000000380)=""/147, 0x93) timer_create(0x0, &(0x7f0000000880)={0x0, 0x0, 0x0, @thr={&(0x7f0000000980), &(0x7f0000000a00)}}, &(0x7f0000000a80)) clock_gettime(0x0, &(0x7f0000000ac0)) clock_gettime(0x0, &(0x7f0000000b80)) timer_settime(0x0, 0x0, &(0x7f0000000b00), &(0x7f00000009c0)) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") request_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000440), &(0x7f00000004c0)='@\x00', 0xfffffffffffffff8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 22:00:48 executing program 2: unshare(0x20400) r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 22:00:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 22:00:48 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000004c0)=""/246) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x2}) ioctl$EVIOCGREP(r0, 0x40047451, &(0x7f0000000000)=""/174) 22:00:49 executing program 5: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) getuid() getgid() getpid() lstat(&(0x7f0000000240)='.\x00', &(0x7f0000000080)) unlink(&(0x7f0000000180)='./file0\x00') open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000280), 0x8, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") 22:00:49 executing program 2: socket$inet6(0xa, 0x0, 0x0) getpriority(0x1, 0x0) 22:00:49 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={&(0x7f0000f8d000), 0xc, &(0x7f00008a7000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000001040101ff0080fffdffff2e0a0800000c0006002f0000007f0000010c00050000ef21ff02f106a8"], 0x2c}}, 0x0) 22:00:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:49 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 22:00:49 executing program 0: io_setup(0x2, &(0x7f0000000000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0356969ef69dc3641ffaa32233333c4c2958e09c443e17836f72666460f1bfd44c19086d962788f1635c49d520a7d0ac97d79fb0fc7fd79aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:00:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:49 executing program 2: syz_emit_ethernet(0x0, &(0x7f00000003c0)=ANY=[], &(0x7f0000000180)) io_setup(0x0, &(0x7f00000002c0)) syz_extract_tcp_res$synack(&(0x7f0000000780), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syncfs(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:00:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:49 executing program 2: delete_module(&(0x7f0000000180)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:00:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 22:00:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:50 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x4000000000400) syz_execute_func(&(0x7f00000000c0)="42805da051c48215b6250a0000000595c3300dc4218812ccc39fe0f58e7e0cc4e3c5687800d3a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 22:00:50 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2={0xff, 0xe}}, 0x1c) 22:00:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0), 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a047f2083897699990693d3dd9868441ff0f183737ebfd673a04d9673a04d920c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bf7745c1e1f7f") 22:00:50 executing program 1: clock_getres(0x0, &(0x7f0000000140)) pkey_alloc(0x0, 0x0) dup(0xffffffffffffff9c) openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000680), 0x4) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:00:50 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0/file0\x00', 0x2) 22:00:50 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:50 executing program 5: rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5652b0000402167f00fbab204000000cac482a538f664410f57dec4817a11910000010023450f2e1ac4010d64ac1e5d2e0f6c0f71fbc4c1d9fb61c7") 22:00:50 executing program 4: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bond0\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond0\x00', 0x40800000002ffd}) 22:00:50 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0x0, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:51 executing program 3: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x98}}, 0x0) 22:00:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424ada75af1f02acc7edbcd7a071fb35331ce39c5a00000000") fchown(r0, 0x0, 0x0) 22:00:51 executing program 0: unshare(0x20400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f00000000c0)={0x0, 0x1, 0x6}, 0x10) 22:00:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x200000001, 0xb, 0x2000000000000009, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x49) 22:00:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000100)={'syz_tun\x00', {0x2, 0x0, @local}}) 22:00:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r2 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge_slave_0\x00', 0x0}) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) io_setup(0x40000000000007, &(0x7f00000000c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000040), 0x20000275}]) 22:00:51 executing program 1: r0 = memfd_create(&(0x7f0000813ffa)='{\x00', 0x0) lseek(r0, 0xfffffffffffffff7, 0x2) 22:00:51 executing program 5: mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)) select(0x40, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={0x0, 0x7530}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000780)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000700)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='veth1_to_bridge\x00'}) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000000c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000380)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0xfffffc30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:00:51 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaf680c200000086dd60aabc7d004400ffffff7f000000000000000000000000aa00000000000000000000ffffac1414000420880b0000000000000800000086dd080088be00000000100000000100000000000000080022eb00000000200000000200000000000000000000000800655800000000"], 0x0) 22:00:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x98}}, 0x0) 22:00:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{&(0x7f0000000180)=@hci, 0x80, &(0x7f0000000700)}}], 0x1, 0x41, 0x0) 22:00:52 executing program 3: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x4, 0x6, 0x80000100000005, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000080)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='md5sum.\x00') 22:00:52 executing program 1: getgid() getgroups(0x0, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:00:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x98}}, 0x0) 22:00:52 executing program 0: memfd_create(&(0x7f0000000380)="1ac77aa0d413eb387a67c20e76a978190d3d8986b502cc5c41dcbbf5766d6e120bd95a686674760935958f8a151e86d7eea5128a15f80c9cc8837d67cf53bcf51be7d31988434e2a6ce2917eaee729cab5caeb2c2448ec075ac1b99dc7b39dc218595911e8e77dfa1e09370a2345c0e2f5dee2cc8b821de4bb3b653e9f46ed9ad90af933dc5b03984d2c2c89b649c4a939eb1733372d91ff18f1fdd5ac05f2a9f383be6f0e850e1edbfe7beb6a938f83da9983dc5200d7ced4080e", 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, 0x6e) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000002c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xbb, &(0x7f0000000cc0)="1ac77aa0d413eb387a67c20e76a978190d3d8986b502cc5c41dcbbf5766d6e120bd95a686674760935958f8a151e86d7eea5128a15f80c9cc8837d67cf53bcf51be7d31988434e2a6ce2917eaee729cab5caeb2c2448ec075ac1b99dc7b39dc218595911e8e77dfa1e09370a2345c0e2f5dee2cc8b821de4bb3b653e9f46ed9ad90af933dc5b03984d2c2c89b649c4a939eb1733372d91ff18f1fdd5ac05f2a9f383be6f0e850e1edbfe7beb6a938f83da9983dc5200d7ced4080e"}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getegid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000780)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) geteuid() lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000900)) getpid() getuid() stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000980)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getuid() getgroups(0x0, &(0x7f0000000b40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@remote, @in=@broadcast}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getgid() gettid() stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getgid() lstat(&(0x7f0000001700)='./file0\x00', &(0x7f0000001740)) fstat(0xffffffffffffffff, &(0x7f00000017c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001840)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001880)) getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000001900)) getresgid(&(0x7f0000001980), &(0x7f00000019c0), &(0x7f0000001a00)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) lstat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b80)) geteuid() getresgid(&(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40)) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001c80)={{{@in=@local, @in6}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000001d80)=0xe8) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01ee73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b00000021676b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:52 executing program 2: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f00000008c0)=0x4) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000007c0), 0xc) bind(0xffffffffffffffff, &(0x7f0000000b80)=@l2, 0xffffffffffffffb9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) lchown(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) getxattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)=ANY=[], &(0x7f0000000880)=""/42, 0x2a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:00:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:52 executing program 5: ustat(0x4, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ftruncate(0xffffffffffffffff, 0x0) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@mcast1}, &(0x7f0000000240)=0x3bd) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000000c0)='syz1\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001800), &(0x7f0000001840)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) getgroups(0x0, &(0x7f0000001900)) getpgid(0x0) stat(&(0x7f0000001940)='./file1\x00', &(0x7f0000001980)) stat(&(0x7f0000001a00)='./file1\x00', &(0x7f0000001a40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001ac0)) fstat(0xffffffffffffffff, &(0x7f0000001b00)) lstat(&(0x7f0000001b80)='./file1\x00', &(0x7f0000001bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") dup(0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000003c0)=""/4096, 0x1000}, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000140)='veth1_to_team\x00') 22:00:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x98}}, 0x0) 22:00:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x98}}, 0x0) 22:00:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x98}}, 0x0) 22:00:52 executing program 3: clock_gettime(0x5, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) pivot_root(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000580)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) memfd_create(&(0x7f00000000c0)='pids.events\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:00:52 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0xfffffffffffffffd, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) readlink(&(0x7f0000000180)='./file2\x00', &(0x7f0000000240)=""/97, 0x61) clock_gettime(0x0, &(0x7f0000000640)) getpid() mkdir(&(0x7f00000004c0)='./file1\x00', 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000001c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000840)='./file2\x00', &(0x7f0000000c80)) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000040)) getgroups(0x0, &(0x7f0000000dc0)) lstat(&(0x7f0000000e00)='./file0/file0\x00', &(0x7f0000000e40)) getgid() stat(&(0x7f00000026c0)='./file1\x00', &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getresgid(&(0x7f0000002800), &(0x7f0000000400), &(0x7f0000002880)) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getgid() stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getgroups(0x0, &(0x7f0000002e00)) getegid() fstat(0xffffffffffffffff, &(0x7f0000002e40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) lstat(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)) timerfd_create(0x0, 0x0) lstat(&(0x7f0000004780)='./file3\x00', &(0x7f00000047c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) getgroups(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a047f2083897699990693d3dd9868441ff0f186937373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2d1217c2940dbbdf3ffffffeefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f7094277767ad67410f6ea70000010006476bffe859591e1f7f") 22:00:52 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet(r0, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) 22:00:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xffffffffffffffff}, 0x4) r1 = socket(0x200000000000011, 0x4000000000080002, 0x8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) write(r1, &(0x7f0000000200)="3e62dd63266616aff6db6f419db7203e6feececb", 0x14) 22:00:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2a, 0x4, 0x0, {0x1, 0x7fffffff, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) 22:00:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000100)=0x4c69, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x80, 0xffa0) 22:00:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:53 executing program 5: getrlimit(0x0, &(0x7f0000000040)) inotify_init() mkdir(&(0x7f0000a7aff6)='./control\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000002c0)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./control\x00', 0x0) inotify_init() ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000280)={'sit0\x00', @ifru_settings={0x0, 0x0, @fr_pvc=&(0x7f0000000240)}}) inotify_add_watch(0xffffffffffffffff, &(0x7f000003a000)='./control\x00', 0x0) creat(&(0x7f0000000040)='./control/file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") 22:00:53 executing program 0: clock_gettime(0xfffffffffffffff9, &(0x7f0000000940)) 22:00:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:53 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty=[0xb000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x88}}, @icmp=@parameter_prob={0x11, 0x4888, 0x0, 0x0, 0x8, 0x6488, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000040)) 22:00:53 executing program 3: eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], &(0x7f0000000580)=""/178, 0xb2) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000280)) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000240)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:00:53 executing program 0: unshare(0x20400) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c833, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x1000000000e, &(0x7f0000000180), 0x4) 22:00:53 executing program 2: getrlimit(0x0, &(0x7f0000000b00)) mknod(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000007c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000180)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000800)=""/198, 0xc6, 0x0, &(0x7f0000000900)=@abs, 0x6e) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000a40)=""/172) getdents64(0xffffffffffffffff, &(0x7f0000000280)=""/127, 0x7f) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000000980)=""/182) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000004c0)=ANY=[]) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000440)) getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)) getgroups(0x0, &(0x7f0000000380)) setfsgid(0x0) link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000500)) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000380)) clock_settime(0x0, &(0x7f0000000140)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000340)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000000c0)) 22:00:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 22:00:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 22:00:53 executing program 1: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:00:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 22:00:54 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000e, 0x13, r0, 0x0) 22:00:54 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000540)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000580)) 22:00:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) 22:00:54 executing program 0: creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000500)='system.posix_acl_access\x00', &(0x7f0000000e00)=ANY=[], 0x0, 0x0) memfd_create(&(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00') ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000140)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:00:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f00000000c0)=0x5e7, 0x2b0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000080)=0x80000001, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000040)) 22:00:54 executing program 5: write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000340)={0x18}, 0x18) stat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:00:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:54 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) syz_open_pts(r0, 0x0) 22:00:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @loopback}, {}, 0x0, {0x2, 0x0, @multicast2}, "0000407100eeffffff00000000000200"}) 22:00:54 executing program 2: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c833, 0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) 22:00:54 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getflags(r0, 0x3) 22:00:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETPERSIST(r0, 0x800454d2, 0x70e000) 22:00:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003d40)={&(0x7f0000000900), 0xc, &(0x7f0000003cc0)=[{&(0x7f0000001f80)={0x10, 0x28, 0x5}, 0x10}], 0x1, 0x0, 0x0, 0x40000}, 0x40004) 22:00:55 executing program 0: getrusage(0xffffffffffffffff, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006b00), &(0x7f0000006b40)=0xc) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000006c00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000006c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006c80)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000006d80)=0xb0) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006dc0)) stat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) lstat(&(0x7f0000006ec0)='./file0\x00', &(0x7f0000006f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009200), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42804da0c6330f0122cec273fe660fef74a409387c3667f9460738286a006bf081768c34c88e230000230000e5bc2b00000021f3e12dba32047000002a0fa20fa2210b0000002e64436e79dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:00:55 executing program 2: inotify_init1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) personality(0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:00:55 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0)="df", 0x1, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffff9) lstat(&(0x7f0000001780)='./file2\x00', &(0x7f0000001800)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x20) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) stat(&(0x7f0000000040)='./file2\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001700)="42805da0c7420f56636073fecc0f3c5045981af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6be279dae5e5410f2e1ac4010d64ac1e5d31a3b744db0f1fee0fd133") openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0x0) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000200)=0x14) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000340)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@loopback}, &(0x7f0000000240)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={0x0, 0x1, 0xfffffffffffffeba, @local}, 0xf) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) 22:00:55 executing program 5: pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000380)=0xc) getpid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000a00)=""/4096) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000400)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x0) dup(0xffffffffffffffff) writev(0xffffffffffffffff, &(0x7f0000000240), 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) link(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) gettid() syz_execute_func(&(0x7f0000001a00)="428055a0876969ef69dc00d9ce41ff0dc4611deed4370f38211a212bc19086d9f28fc9410feefa4e2179fbe5e50f2e1a0f59f136d3a1feefffffc463d5688dfeefffff9bbf") 22:00:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 22:00:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={"6e6174680200000600", 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, &(0x7f00000000c0), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'ip6gre0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'veth1_to_bridge\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe8, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x2}}}]}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}, {{{0x15, 0x0, 0x0, 'ip_vti0\x00', 'syz_tun\x00', 'sit0\x00', 'bond0\x00', @remote, [], @local, [], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'RAS\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x28c) 22:00:55 executing program 1: r0 = socket(0x11, 0x80002, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) fcntl$setstatus(r0, 0x4, 0x2800) syz_emit_ethernet(0xf, &(0x7f0000000080)={@local, @broadcast, [], {@generic={0x0, "1b"}}}, 0x0) 22:00:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 22:00:55 executing program 1: futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000140)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) clock_gettime(0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") sendto$inet6(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000380)={0x0, &(0x7f0000000340)}, 0x10) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000200)) geteuid() clock_gettime(0x0, &(0x7f0000000640)) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) futex(&(0x7f0000000600), 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0), 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000540)=""/147) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, 0xe8) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getpgid(0xffffffffffffffff) 22:00:55 executing program 5: clock_gettime(0x2, &(0x7f0000000200)) pipe(&(0x7f0000000d40)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000640)) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 22:00:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 22:00:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:56 executing program 0: ppoll(&(0x7f0000000100)=[{}], 0x200000000000030d, 0x0, &(0x7f0000000300)={0x1}, 0x8) 22:00:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0xc0189436, &(0x7f00000000c0)) 22:00:56 executing program 3: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 22:00:56 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:56 executing program 2: mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="0001705f66696c657300") getdents(r0, &(0x7f0000000ea9)=""/407, 0x4ee) 22:00:56 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) r1 = epoll_create(0xe29f) ioctl(r0, 0x8912, &(0x7f00000000c0)="153f6234488dd25d766070") ppoll(&(0x7f00000001c0)=[{r1}], 0x1, &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f0000000300), 0x8) 22:00:56 executing program 5: pipe(&(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000240)="b7", 0x1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000040), 0xfffffd94}], 0x1, 0x0) 22:00:56 executing program 1: unshare(0x28020400) unshare(0x40000) 22:00:57 executing program 0: socketpair$inet6(0xa, 0x80803, 0x4, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) rt_sigpending(&(0x7f00000000c0), 0x8) timerfd_create(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080), 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 22:00:57 executing program 2: prctl$void(0x24) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6}}, {{@in=@remote}}}, &(0x7f0000000580)=0xe8) io_setup(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000001780)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:00:57 executing program 5: get_robust_list(0xffffffffffffffff, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f0000000200)=0xc) 22:00:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in=@rand_addr, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) 22:00:57 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000200)) keyctl$read(0xb, r1, &(0x7f0000000000)=""/170, 0xaa) 22:00:57 executing program 1: clock_settime(0x0, &(0x7f0000000600)) sync() eventfd2(0x0, 0x0) epoll_create1(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='.\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@mcast1}, &(0x7f0000000440)=0xffffffffffffff32) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000008c0)={0x0, 0x1, 0x1, @random="c5b9c49bedf1"}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), 0x14) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000a40)) getpgid(0x0) keyctl$set_reqkey_keyring(0xe, 0x0) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000040), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0x1f9, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") clock_gettime(0x0, &(0x7f0000000680)) futex(&(0x7f0000000640), 0x0, 0x0, &(0x7f00000006c0), &(0x7f0000000700), 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000900)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000940)=0x10) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) 22:00:57 executing program 3: unshare(0x40400) sendto$inet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) 22:00:57 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x19) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000040)={@val, @val, @llc={@snap={0x0, 0x0, "e7", "2a79e4"}}}, 0x16) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000140)) close(0xffffffffffffffff) timerfd_create(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 22:00:57 executing program 4: symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0\x00') madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:00:57 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="428055a0c6c4017956200f01efc4e1a975d5c4817b12e119fa380f38211af3f081768cc8000000c481b5e5bc2b000000219fddf00fbab244000000caca2179dae5e5417545d00fae1ac4110dd4ac1e5dc4617162eef371cc120703") 22:00:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'veth1_to_team\x00', {0x2, 0xfffffffffffffffc, @rand_addr=0xfffffffffffffffc}}) 22:00:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000)='+', 0x1, 0x0, 0x0, 0x0) 22:00:58 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002b80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004540)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000000180)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004780)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004880)=0xe8) getresuid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xfffffffffffffd72) getegid() getpid() getpgrp(0x0) stat(&(0x7f0000004b80)='./file0\x00', &(0x7f0000004bc0)) fstat(0xffffffffffffffff, &(0x7f0000004c40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@remote, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0xe8) getgid() gettid() stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) getpid() stat(&(0x7f0000005200)='./file0\x00', &(0x7f0000005240)) getgid() gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:00:58 executing program 0: syz_emit_ethernet(0x2c, &(0x7f0000000280)={@local, @local, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@broadcast, @current}, {@broadcast, @random="cbe749897d69"}}}}}, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) gettid() getpid() getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:00:58 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000280), &(0x7f0000000540)='\x00', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000200)={r2, r2, r2}, &(0x7f0000000300)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f00000002c0)={'crc32c-generic\x00'}}) 22:00:58 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000700)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000740)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) epoll_create1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefae5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 22:00:58 executing program 1: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000500), &(0x7f0000000240)=0x9) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team0\x00'}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000040), &(0x7f0000000580), &(0x7f0000000100), &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) time(&(0x7f0000000140)) add_key$user(&(0x7f0000000740)='user\x00', &(0x7f0000000780), &(0x7f0000000900), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000001900)='user\x00', &(0x7f0000001940), &(0x7f0000001980), 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000001a80)='id_legacy\x00', &(0x7f0000001ac0), &(0x7f0000001b00), 0x0, 0xfffffffffffffff8) keyctl$setperm(0x14, 0x0, 0x0) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) getpgid(0x0) ioprio_get$pid(0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000540)) setxattr$trusted_overlay_nlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)='trusted.overlay.nlink\x00', &(0x7f0000000840)={'L-', 0x1}, 0x28, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000480)) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000180)) recvfrom$unix(0xffffffffffffffff, &(0x7f00000002c0)=""/55, 0x37, 0x0, &(0x7f0000000300)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:00:58 executing program 5: add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000080), &(0x7f0000000240)='keyringvmnet0!\x00', 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getpgid(0x0) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000001c0)=0x146) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000400)) getpgrp(0xffffffffffffffff) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) getpgrp(0xffffffffffffffff) getpgid(0x0) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f00000007c0)=0xe8) getgroups(0x0, &(0x7f0000000800)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getpid() stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getpgid(0x0) getresuid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000012c0)={{{@in=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000013c0)=0xe8) getresgid(&(0x7f0000001400), &(0x7f00000002c0), &(0x7f0000001480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001780)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}}}, &(0x7f00000018c0)=0xe8) getgroups(0x0, &(0x7f0000001900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001940)) getresuid(&(0x7f0000001980), &(0x7f00000019c0), &(0x7f0000001a00)) getgroups(0x0, &(0x7f0000000140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fstat(0xffffffffffffffff, &(0x7f0000001ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) getuid() getegid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000021c0), &(0x7f0000002200)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:00:58 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x200000, 0x0) io_setup(0xfff, &(0x7f0000000640)=0x0) io_submit(r1, 0x1, &(0x7f0000000a00)=[&(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x3, r0}]) 22:00:58 executing program 4: pselect6(0x1c, &(0x7f0000000300), &(0x7f0000000380), &(0x7f00000003c0)={0x8}, &(0x7f0000000400)={0x0, 0x989680}, &(0x7f0000000100)={&(0x7f0000000440), 0x8}) 22:00:58 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000140)) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), &(0x7f0000000180)="c3ec690c0859c847c9c92e981865f614f8584a3836ea0698da6f7e12339a5b4666f906ab90b9f26700", 0x29, 0xfffffffffffffffd) 22:00:58 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) munlockall() accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000180), 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) accept4(0xffffffffffffffff, &(0x7f0000000600)=@alg, &(0x7f0000000680)=0x80, 0x0) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") clock_nanosleep(0xfffffffffffffffc, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000500)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000200)) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:00:59 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', 0x0, 0x0) readlink(&(0x7f0000000180)='./file2\x00', &(0x7f0000000240)=""/97, 0x61) clock_gettime(0x0, &(0x7f0000000300)) getpid() sched_rr_get_interval(0x0, &(0x7f0000000400)) mkdir(&(0x7f00000004c0)='./file1\x00', 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) lstat(&(0x7f0000000840)='./file2\x00', &(0x7f0000000c80)) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000dc0)) lstat(&(0x7f0000000e00)='./file0/file0\x00', &(0x7f0000000e40)) getgid() stat(&(0x7f00000026c0)='./file1\x00', &(0x7f0000002700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002780), &(0x7f00000027c0)=0xc) getresgid(&(0x7f0000002800), &(0x7f0000002840), &(0x7f0000002880)) stat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) getgid() stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) getgroups(0x0, &(0x7f0000002e00)) getegid() fstat(0xffffffffffffffff, &(0x7f0000002e40)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) lstat(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)) timerfd_create(0x0, 0x0) lstat(&(0x7f0000004780)='./file3\x00', &(0x7f00000047c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0) getgroups(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@multicast2, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)) stat(&(0x7f0000000480)='./file1\x00', &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000980)="428055a047f2083897699990693d3dd9868441ff0f186937373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2d1217c291a1aeefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f7094277767ad67410f6ea70000010006476bffe859591e1f7f") 22:00:59 executing program 5: futex(&(0x7f000000cffc), 0xb, 0x0, &(0x7f000000b000), &(0x7f0000048000), 0x0) 22:00:59 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x5, 0x7, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x1ff, 0x4, 0x100000001, 0x1, r1}, 0x2c) 22:00:59 executing program 0: socket$unix(0x1, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000800)) clock_settime(0x0, &(0x7f00000002c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x1ae, &(0x7f0000000c80), 0x0, &(0x7f0000000c00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0x323) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000400), 0xc, &(0x7f0000001840)={&(0x7f0000002600)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000440)}) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000600)=0x139) clock_gettime(0x0, &(0x7f0000000680)) finit_module(0xffffffffffffffff, &(0x7f0000000080)='lo.em1eth0trusted$\x00', 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000c40)) 22:00:59 executing program 5: setxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000002c0)=""/70) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) getpeername(0xffffffffffffffff, &(0x7f0000000480)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x80) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000380)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f000039a000)=[{0x4d}, {0x6}]}, 0x10) 22:01:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000000)="00cc02f6", 0x4, 0x1000020018800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x65, 0x0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) recvmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000003700), 0x0, &(0x7f0000003780)=""/232, 0xe8}}], 0x1, 0x0, &(0x7f0000003bc0)) 22:01:00 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0, &(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e) 22:01:00 executing program 4: sigaltstack(&(0x7f0000fef000/0x11000)=nil, &(0x7f0000000840)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'ip_vti0\x00', {0x2, 0x0, @multicast2}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) signalfd(0xffffffffffffffff, &(0x7f00000003c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="61541b992d80"}, 0x14) syz_execute_func(&(0x7f00000009c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) getitimer(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f00000007c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00000001c0)=""/190, &(0x7f0000000080)=0xbe) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000400)={'bond_slave_0\x00', {0x2, 0x0, @local}}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000500)) 22:01:00 executing program 0: remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sched_getparam(0x0, &(0x7f0000000040)) getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000200)) sysinfo(&(0x7f0000000840)=""/245) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) arch_prctl(0x0, &(0x7f00000000c0)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000340)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8901, &(0x7f0000000140)={'teql0\x00'}) 22:01:00 executing program 5: setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cgroup\x00') write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) fcntl$getflags(0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) getresuid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000280)) getgid() ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f00000002c0)={0x78}, 0x78) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000003c0)={{0x2, 0x0, @multicast1}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast1}, 'ip6tnl0\x00'}) eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000000c0)) mmap(&(0x7f00006e0000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a063c4a27920860f000000908a203637c3397c2a0f0fcdae300f38211a40a5647f1a4141e0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:01:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x2, 0x200, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000080), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'bridge_slave_0\x00', 'veth0_to_bridge\x00', 'sit0\x00', 'ip6gretap0\x00', @dev, [], @dev, [], 0xa0, 0xa0, 0xd0, [@cgroup0={'cgroup\x00', 0x8}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'nr0\x00', 'yam0\x00', 'yam0\x00', 'veth1_to_team\x00', @link_local, [], @dev, [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x23c) 22:01:00 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") pipe(&(0x7f00000000c0)) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000040)={0x18}, 0x18) 22:01:01 executing program 2: clock_gettime(0x4, &(0x7f0000000780)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001440)=0xe8) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000240), &(0x7f0000000280)=0x8) stat(&(0x7f0000000640)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xba, &(0x7f0000000e00)=""/186}, 0x48) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@multicast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000a00)=0xe8) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)=@raw, &(0x7f0000000140)='GPL\x00', 0x0, 0x62, &(0x7f00000001c0)=""/98}, 0x48) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8) truncate(&(0x7f00000006c0)='./file0\x00', 0x0) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:01:01 executing program 5: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000200), &(0x7f00000001c0)=0x10) 22:01:01 executing program 0: clock_adjtime(0x0, &(0x7f00000004c0)) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0), 0xc, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[]}}, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000140), 0x4) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getpgrp(0xffffffffffffffff) 22:01:01 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x2) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000780)}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) accept4$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f0000000300)=0x10, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_getmulticast={0x14, 0x3a, 0x703}, 0xfedb}}, 0x0) 22:01:01 executing program 4: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000280)=@nfc, &(0x7f0000000200)=0x80, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)=""/142, 0x8e) clock_getres(0x0, &(0x7f0000000040)) pipe(&(0x7f0000000200)) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bec401fd5a2613a5dcfc2273c4e161763f380f38211af3f0817e768cc80000202081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb") 22:01:01 executing program 1: keyctl$set_reqkey_keyring(0xf, 0x7) dup(0xffffffffffffffff) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 22:01:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7) sendto$inet6(r0, &(0x7f0000f6f000), 0x5b37ca81a71c1086, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) close(r0) 22:01:02 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:01:02 executing program 2: clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)={'broute\x00'}, &(0x7f00000000c0)=0x78) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) 22:01:02 executing program 0: inotify_init1(0x0) ftruncate(0xffffffffffffffff, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 22:01:02 executing program 1: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x2, &(0x7f0000000280)=0x0) r3 = eventfd2(0x0, 0x0) io_submit(r2, 0x0, &(0x7f0000000900)) io_submit(r2, 0xb6a04a8, &(0x7f0000000340)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x1, r3}]) 22:01:02 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x50, &(0x7f0000000300)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000240)='\x00'}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) getpgrp(0x0) open(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000440)}, 0x10) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f00000007c0)='trusted.overlay.upper\x00', &(0x7f0000000880)=ANY=[], 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000400), 0x4) getpgrp(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000700)) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000740)={0x0, &(0x7f00000007c0)}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=""/159, &(0x7f0000000200)=0x9f) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000540)='./file0\x00', 0x8, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@remote}, &(0x7f0000000780)=0x14) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000800)) pselect6(0x40, &(0x7f0000000380), &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000005c0), &(0x7f0000000640)={&(0x7f0000000600), 0x8}) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:01:02 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='cgroup.controllers\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x24) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000340)=""/117, 0x75}], 0x1) 22:01:02 executing program 1: unshare(0x20400) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_buf(r0, 0x1, 0x1f, &(0x7f0000000180)=""/248, &(0x7f0000000000)=0xf8) 22:01:03 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x802, 0x0) r1 = dup(r0) close(0xffffffffffffffff) creat(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) write$P9_RREMOVE(r1, &(0x7f0000000140)={0x7, 0x7b, 0x2}, 0x7) 22:01:03 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x4011, r0, 0x0) mprotect(&(0x7f00001c1000/0x2000)=nil, 0x2000, 0x1) 22:01:03 executing program 2: eventfd2(0x0, 0x0) readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f0000000180), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000001640)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:01:03 executing program 1: epoll_create(0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000140)={0x12509e3bf4d420d4}, 0x7) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000300)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) getuid() stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@mcast2, @in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002940), &(0x7f0000002980)=0xc) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002dc0), &(0x7f0000002e00)=0xc) getegid() lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) fstat(0xffffffffffffffff, &(0x7f0000002f00)) geteuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c740)={{{@in, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000079c0)=0x1000002c3) fstat(0xffffffffffffffff, &(0x7f0000003340)) lstat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003400)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003500), &(0x7f0000003540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003700)=0xe8) getresgid(&(0x7f0000003740), &(0x7f0000003780), &(0x7f00000037c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007500)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000007600)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000007640)) geteuid() getgid() getresuid(&(0x7f00000076c0), &(0x7f0000007700), &(0x7f0000007740)) stat(&(0x7f0000007780)='./file0\x00', &(0x7f00000077c0)) lstat(&(0x7f0000009100)='./file0\x00', &(0x7f0000009140)) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000091c0)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000092c0)=0xe8) lstat(&(0x7f0000009300)='./file0\x00', &(0x7f0000009340)) 22:01:03 executing program 0: clock_gettime(0xfffffffffffffffe, &(0x7f0000000800)) clock_settime(0x0, &(0x7f00000002c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x1ae, &(0x7f0000000c80), 0x0, &(0x7f0000000c00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0x323) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'bond_slave_0\x00'}) 22:01:03 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') write$P9_RSYMLINK(r0, &(0x7f0000000040)={0x14}, 0x14) 22:01:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x7, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) 22:01:03 executing program 5: munlockall() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) ioprio_get$pid(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000540)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f00000006c0)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f00000006c0)) truncate(&(0x7f0000000180)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ustat(0x0, &(0x7f0000001200)) 22:01:04 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:04 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$get_keyring_id(0x0, 0x0, 0x0) 22:01:04 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) r1 = memfd_create(&(0x7f0000000200)='GPLsystem-$\x00', 0x0) unshare(0x20400) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x8013, r1, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 22:01:04 executing program 1: ioprio_set$uid(0x3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='loginuid\x00') ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000000c0)) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 22:01:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x1, 0xffffffff00000000}) 22:01:05 executing program 2: lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)=@known='system.sockprotoname\x00', &(0x7f0000000200)=""/134, 0x86) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000580)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a087c4e17d7099322333330090c841ff0fc4613f10da370f38211ac4c19086d9f28fc9410feefa4e217ffbe5e55d0f2e1a1a01dbe431a3b786e2989f7f") 22:01:05 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) set_robust_list(&(0x7f00000004c0)={&(0x7f0000000140)={&(0x7f0000000240)}}, 0x42e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f000086eff0)={0x2, 0x4e22, @multicast2}, 0x10) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast1, 0x5}, 0x1c) 22:01:05 executing program 0: syz_emit_ethernet(0x0, &(0x7f00000003c0)=ANY=[], &(0x7f0000000180)) io_setup(0x0, &(0x7f00000002c0)) syz_extract_tcp_res$synack(&(0x7f0000000780), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syncfs(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4), 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x0, &(0x7f0000346fc8)=ANY=[], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040), 0x10) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:01:05 executing program 5: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000400), 0x0, 0x0, 0xfffffffffffffffc) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0), &(0x7f0000000540)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'ip_vti0\x00'}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000340)) getresgid(&(0x7f00000003c0), &(0x7f0000000500), &(0x7f0000000580)) mount$fuse(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000080)=@req3, 0x1c) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000006c0)) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000400)=""/239) io_setup(0x0, &(0x7f0000000140)) io_cancel(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f0000000300)) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)={0x28}, 0x28) 22:01:05 executing program 1: prctl$void(0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f0000000640)) eventfd2(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000009c0)) setfsgid(0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000007c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000800), &(0x7f0000000840)=0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6gre0\x00'}) setresuid(0x0, 0x0, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000700)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000580)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000002c0)={0x83139a82865b1543}, 0xffffff0a) 22:01:05 executing program 4: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0)="df", 0x1, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, 0x0, 0x0) eventfd2(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23e66440f55ab0000ffffd8c70b00000244be80cc39390f383065f047fe06450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:01:05 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) io_setup(0x23, &(0x7f0000c6b000)=0x0) io_submit(r0, 0x1, &(0x7f00000027c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080)}]) 22:01:05 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000000)=0xffff, 0x4) bind$unix(r2, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) accept4$unix(r2, &(0x7f000046f000)=@abs, &(0x7f0000937000)=0x8, 0x0) 22:01:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, r1) add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00), &(0x7f0000000380)="7f", 0x1, 0x0) r3 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x10c, r2) keyctl$dh_compute(0x17, &(0x7f0000000040)={r3, r3, r3}, &(0x7f00000004c0)=""/238, 0xee, &(0x7f0000000180)={&(0x7f0000000080)={'sha3-256-generic\x00'}, &(0x7f0000000100)}) 22:01:05 executing program 0: getrusage(0xfffffffffffffffc, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:01:05 executing program 2: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000640)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) getpgrp(0x0) getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) gettid() getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000bc0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@mcast1}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000500)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresuid(&(0x7f0000000580), &(0x7f0000000440), &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:01:06 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe(&(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) sched_getscheduler(0x0) setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) getpid() getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpgrp(0x0) getpid() socket$packet(0x11, 0x0, 0x300) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc, 0x80, &(0x7f0000000040)}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f00000015c0)='./file0/file0\x00', &(0x7f0000002780)) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000002800)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003200)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003300)=0xe8) getresgid(&(0x7f0000003340), &(0x7f0000003380), &(0x7f00000033c0)) getresuid(&(0x7f0000003400), &(0x7f0000003440), &(0x7f0000003480)) getgroups(0x0, &(0x7f00000034c0)) fstat(0xffffffffffffffff, &(0x7f0000003500)) getgid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000003580)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003880)={{{@in6=@remote, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000003980)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000039c0), &(0x7f0000003a00)=0xc) getuid() stat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) getgroups(0x0, &(0x7f0000003d80)) fstat(0xffffffffffffffff, &(0x7f0000003dc0)) getgid() getresuid(&(0x7f0000005140), &(0x7f0000005180), &(0x7f00000051c0)) getgroups(0x0, &(0x7f0000005200)) stat(&(0x7f0000005240)='./file0\x00', &(0x7f0000005280)) getgroups(0x0, &(0x7f0000005300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005340)={{{@in, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000005440)=0xe8) getgid() geteuid() stat(&(0x7f0000005480)='./file0\x00', &(0x7f00000054c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006900)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000006a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006a40), &(0x7f0000006a80)=0xc) stat(&(0x7f0000006ac0)='./file0/file0\x00', &(0x7f0000006b00)) fstat(0xffffffffffffffff, &(0x7f0000006b80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006c80), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000001640)='net/mcfilter\x00') ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000002700)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x0, {0x2, 0x0, @rand_addr}, 'bpq0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001700)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f8f49c892c842d85d096b2179660f38302fbae5e5e57545972e0ec4010d64ac1e5d31a3b7e29873bb7f") 22:01:06 executing program 0: pipe(&(0x7f0000000340)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000640), 0x4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000004c0)=""/143) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@remote, @multicast1}, &(0x7f0000000080)=0x8) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000009c0), 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)) waitid(0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000740)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @multicast2}, &(0x7f00000001c0)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={@dev, @loopback}) fstatfs(0xffffffffffffffff, &(0x7f0000000600)=""/22) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000b00)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) stat(&(0x7f0000000840)='./file0/../file0\x00', &(0x7f0000000c00)) getegid() setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000680), 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000a00)='system.posix_acl_access\x00', &(0x7f0000000d80)=ANY=[], 0x0, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) clock_getres(0x0, &(0x7f0000000400)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 22:01:06 executing program 5: setgroups(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) getuid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) keyctl$revoke(0x3, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:06 executing program 1: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgrp(0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x11, @loopback, 0x0, 0x1, 'wrr\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 22:01:06 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f00000001c0)=[{{}, 0x1, 0x74}], 0x18) r1 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) sendfile(r1, r0, &(0x7f0000000140), 0x100040001) 22:01:06 executing program 4: r0 = socket(0x4000000000000010, 0x2, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)="2f657865000000d400042a004bddd9de91be10eebf00f5e94aae22e89bb36cc7457accc3320c67a90f79805843e901d2da75af1f000000000000000045cc6158f031528844209c7ed05b160ef336721bf89686ff472f71dfca5353f6323ddf8006ffc1052d6a80985adc68017065648b35c7d321fc5c0466062fbfad5acbe7ff6cefe53c88c05ab970ceebdfa589098ad40d080deb2488f9e4069682b14483f113cb6979b2f390179a18e26b4088f1f31ed04a0a681f002e007436947475ab073711c98ae3b4259f1a1aff9b09aa66cb90ca43a1dbc6de15abb4ae739f9e8f047cd29ec76b9ef6beb7839f8071aaea4d247e6a9514748c93d0bb01a7c37ca6c856327af81f296d2c2c07c2d63b") sendfile(r0, r1, &(0x7f0000000080), 0x80001002) 22:01:06 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/4096}, {&(0x7f0000001340)=""/238}, {&(0x7f0000000040)=""/19, 0xfffffffffffffdbd}, {&(0x7f0000001440)=""/248}], 0x285, 0x0) 22:01:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x27, &(0x7f0000000180), 0x0) 22:01:06 executing program 4: chroot(&(0x7f0000000240)='./file0\x00') msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='security.apparmor\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) getegid() dup2(0xffffffffffffffff, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000002f80)) recvmmsg(0xffffffffffffffff, &(0x7f0000002d80), 0x0, 0x0, &(0x7f0000002fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003000)={{{@in=@remote, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000003100)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003140), &(0x7f0000003180)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000005c40), 0x0, 0x0, &(0x7f0000005e00)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005e40)={{{@in=@rand_addr, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000005f40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000060c0)={{{@in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000061c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006240)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006340)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000006380)={'gretap0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000063c0)={{{@in6=@remote, @in6}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f00000064c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006500), &(0x7f0000006540)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000006580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000065c0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000006600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006640)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000079c0)={{{@in6=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000007ac0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007b00)={{{@in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000007c00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000007cc0)={{{@in6=@mcast1, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000007dc0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000007f00)={0x0, @rand_addr, @rand_addr}, &(0x7f0000007f40)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000008040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008080)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000008780)={&(0x7f0000000140), 0xc, &(0x7f0000008740)={&(0x7f00000080c0)={0x14}, 0x14}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='vlan0\x00'}, 0x10) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/60) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f5835c9356b7dae7dae0779fbc463fd7998b400ba000079aaff43d0e146010d64ac1e5d31a314b706e205987b7f") 22:01:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000fd0ffc)=0xe) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c833, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)) 22:01:06 executing program 2: select(0x40, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000380)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000540), &(0x7f0000000580)=0x40) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) getpid() sched_setscheduler(0x0, 0x0, &(0x7f00000002c0)) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000180)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) syz_execute_func(&(0x7f0000000680)="428055a08e6969ef69dc00d979c041f60b0b37c4c3397c2a060f38211a40a5c19086d9f28fc9fc410feefafa7a5d0f2e1a1a010d64ac1e5d31a3b786e298c7e997d0") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) ioctl$EVIOCSREP(0xffffffffffffff9c, 0x40084503, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@multicast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) getgroups(0x0, &(0x7f0000000c00)) getuid() lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) getresuid(&(0x7f0000005a00), &(0x7f0000005a40), &(0x7f0000005a80)) lstat(&(0x7f0000005ac0)='./file0\x00', &(0x7f0000005b00)) fstat(0xffffffffffffffff, &(0x7f0000005b80)) getresgid(&(0x7f0000005c00), &(0x7f0000005c40), &(0x7f0000005c80)) geteuid() getgroups(0x0, &(0x7f0000000300)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005d00)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000005e00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000640)=0x319) getuid() getgroups(0x0, &(0x7f0000005ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008540), &(0x7f0000008580)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000008600)=0xc) stat(&(0x7f0000008640)='./file0\x00', &(0x7f0000008680)) lstat(&(0x7f0000008700)='./file0\x00', &(0x7f0000008740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000087c0), &(0x7f0000008800)=0xc) getegid() lstat(&(0x7f0000008840)='./file1\x00', &(0x7f0000008880)) getegid() stat(&(0x7f0000008900)='./file0\x00', &(0x7f0000008940)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008a80), &(0x7f0000008ac0)=0xc) getresgid(&(0x7f0000008b00), &(0x7f0000008b40), &(0x7f0000008b80)) 22:01:07 executing program 3: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000000)={'vcan0\x00', @ifru_addrs=@vsock={0x28, 0x0, 0x0, @reserved}}) 22:01:07 executing program 5: getrusage(0x0, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:01:07 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) r1 = getpid() ioprio_get$pid(0x2, r1) 22:01:07 executing program 1: timer_getoverrun(0x0) keyctl$join(0x1, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:01:07 executing program 4: r0 = socket(0x1e, 0x5, 0x0) sendto(r0, &(0x7f0000000040), 0x0, 0xc4, &(0x7f00000001c0)=@ax25={0x3, {"011837e574f9a9"}}, 0x80) 22:01:07 executing program 2: setgroups(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) getuid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000200)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000ac0)=@deltclass={0x24}, 0x24}}, 0x0) request_key(&(0x7f0000000400)='pkcs7_test\x00', &(0x7f0000000440), &(0x7f0000000500)='-\x00', 0x0) add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0xffffffffffffff4e) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) setns(0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) keyctl$revoke(0x3, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) keyctl$update(0x2, 0x0, &(0x7f0000000080), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000940)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_vs_stats\x00') read(r0, &(0x7f0000000640)=""/173, 0xad) 22:01:08 executing program 0: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x1, 0x90, [0x0, 0x20000600, 0x20000630, 0x20000660], 0x0, &(0x7f0000000000), &(0x7f0000000600)=[{}, {}, {}]}, 0xe0) socket$inet6(0xa, 0x100000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:01:08 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, [0x80ffff, 0xe4ffffff]}, 0x2c) 22:01:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@get={0x1, &(0x7f0000000100)=""/203, 0xfff}) 22:01:08 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffffffffffff}, 0xc) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000480), 0x8) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) 22:01:08 executing program 4: clock_getres(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) eventfd(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fstat(0xffffffffffffffff, &(0x7f00000005c0)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/69, &(0x7f00000003c0)=0x45) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000780)) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000006c0)) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) timerfd_create(0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000e40)=@nat={'nat\x00', 0x1b, 0x5, 0x510, 0x380, 0x380, 0x0, 0x270, 0x270, 0x640, 0x640, 0x640, 0x640, 0x640, 0x5, &(0x7f0000000b00), {[{{@uncond, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv6=@dev}}}, {{@uncond, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={[], [], @local}, 'eql\x00'}}}, {{@uncond, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@loopback, @port, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv4=@multicast2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x570) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)) symlink(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='./file0\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000400), 0xc, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000700)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) 22:01:08 executing program 3: r0 = socket$inet6(0xa, 0x80803, 0x4) getsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f00000000c0), &(0x7f0000001380)=0x4) 22:01:08 executing program 5: ioprio_set$uid(0x2, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000400)='./file0\x00'}, 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000640)) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000480)) utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000080), 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/246) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@rand_addr, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) quotactl(0x5, &(0x7f0000000300)='./file0\x00', r2, &(0x7f0000000780)="3bd86cb9b88807d4c2b34220ce9ee67debe77e9f86dde522053538451273c30d978a2495a9793650acca73e6b987b70014afe71f26da2a345a41ff5891aff42fb0a7d9777e1bda79aded86c86c14db2dc81f0c3cd2fb0b086aa67371fe6ca2df9c27b189207f472bf3f29a99017bed162a1cbab9c8488462d68fe5c57d564379502a5a1cdb04d7099fd034dcedc9054f") accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1c, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "7ab439ea9686726bfabc4462b499c9875263b31736f93eb15fa8aba2c8f8f2ec02c96d354931be195c8812b83612d3e80f2ada1f63db4e78af030718956d254433d36563f2130380b510e943d25c2a3c"}, 0xd8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000300)}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 22:01:08 executing program 1: setgroups(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) getuid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) keyctl$revoke(0x3, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:08 executing program 2: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000580)='./file1\x00', 0x0) request_key(&(0x7f00000005c0)='dns_resolver\x00', &(0x7f0000000640), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0xfffffffffffffffa) truncate(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:08 executing program 0: prctl$intptr(0x8, 0x0) seccomp(0x100000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000007c0)="428055a059878769ef69dc7cd9f0008f00008020c421fa7fb432322333331837c4011573d8cf0f38211ac4c10c96d9f28fc9410feefa4e2179fbe5e5c4839d0cb30080ff99e9c4010d64ac1e5d31a3b77207f0802403089f4b") 22:01:08 executing program 4: ioprio_set$uid(0x2, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000240)) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000400)='./file0\x00'}, 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:01:09 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000080), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 22:01:09 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) get_robust_list(r1, &(0x7f0000000100)=&(0x7f00000000c0)={&(0x7f0000000080)={&(0x7f0000000040)}}, &(0x7f0000000140)=0x18) 22:01:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5cc80700315f85715070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) keyctl$set_reqkey_keyring(0xe, 0x2) 22:01:09 executing program 1: eventfd(0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@ipx, &(0x7f0000000240)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast2, @in=@broadcast}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xfffffffffffffe8d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d80)="428055a08f6969ef69dc00d9c4e17911466fc841ff0f1837c4c3397c2a060f38211a40a5819086d9f28fc9410feee50f50e67545c421a22a04a00f2e1a1a0126460fe4e731a3b786e2989f7f") 22:01:09 executing program 2: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") pipe(&(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') 22:01:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000340)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x2, &(0x7f00000002c0)={@rand_addr=0x1000000, @multicast1}, 0xc) 22:01:09 executing program 3: r0 = socket(0x400000000000a, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={"76657468303aaf6f5f62726964666500"}) 22:01:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100), 0xfb) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 22:01:09 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getcwd(&(0x7f0000000100)=""/7, 0x7) 22:01:09 executing program 0: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000980)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c00)={0x0, @loopback, @dev}, &(0x7f0000000c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in6=@dev, @in=@local}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000ec0)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000940), 0xc, &(0x7f0000001080)={&(0x7f0000000f00)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f00000005c0)="f5568055a07a7a69ef69dc00d990c841ff0fc4017b2d11c642651d69ca38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5dc422699ea9000000807f") socket$nl_netfilter(0x10, 0x3, 0xc) syz_execute_func(&(0x7f0000000400)="3e42d1e6f336d152322e36429866440f179b08000000f36f67410f71f7fff3400fb8ad0c36448d8f4978c3c4c4c3e94869a20ec403f1401836") 22:01:10 executing program 5: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000240)={0x0, &(0x7f00000003c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000480)) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c80)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000002d80)=0xe8) getgroups(0x0, &(0x7f0000002dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002e00)) fstat(0xffffffffffffffff, &(0x7f0000002e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002f40)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003040)=0xe8) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)) fstat(0xffffffffffffffff, &(0x7f0000003180)) getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000032c0)={{{@in6=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) lstat(&(0x7f0000003400)='./file0\x00', &(0x7f0000003440)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003680), &(0x7f00000036c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003a00)) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000046c0)={{{@in6=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000047c0)=0xe8) getgroups(0x0, &(0x7f0000004800)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004840)='\x00'}, 0x30) getresuid(&(0x7f00000048c0), &(0x7f0000004900), &(0x7f0000004940)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000049c0)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@multicast1}}, &(0x7f0000004ac0)=0xe8) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b00)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004c00)=0xe8) stat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004d40)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000004e40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004e80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004f00)) lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006380), &(0x7f00000063c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000006400)) getresuid(&(0x7f0000006500), &(0x7f0000006540), &(0x7f0000006580)) lstat(&(0x7f00000065c0)='./file0\x00', &(0x7f0000006600)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:10 executing program 4: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000240), &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:01:10 executing program 1: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) unlink(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000880)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgroups(0x0, &(0x7f00000003c0)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000540)) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getgid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgroups(0x0, &(0x7f0000000800)) chmod(&(0x7f0000000940)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a06b6969ef69dc00d99069401737a6c13b3b44060f38211a40a564a741dfe0400f01efe5e54175457d0e2e1a1a01460f01ec31a3b786e2989f3f") 22:01:10 executing program 5: getrlimit(0x0, &(0x7f0000000040)) inotify_init() mkdir(&(0x7f0000a7aff6)='./control\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000001c0)) write$P9_RVERSION(0xffffffffffffffff, &(0x7f00000002c0)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./control\x00', 0x0) inotify_init() ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000280)={'sit0\x00', @ifru_settings={0x0, 0x0, @fr_pvc=&(0x7f0000000240)}}) inotify_add_watch(0xffffffffffffffff, &(0x7f000003a000)='./control\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") 22:01:10 executing program 0: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f0000000440), &(0x7f0000000480)='\\\\\\cpusetproc!eth1\x00', 0xfffffffffffffffe) keyctl$get_security(0x11, 0x0, &(0x7f00000004c0)=""/203, 0xcb) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000740), 0x0, 0x0, 0xffffffffffffffff) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000280)) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) syz_execute_func(&(0x7f0000000800)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) close(0xffffffffffffffff) io_setup(0x0, &(0x7f0000000100)) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond0\x00'}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x20}, 0x20}}, 0x0) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) keyctl$set_reqkey_keyring(0x10, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0x0) mlock2(&(0x7f00007e0000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x20000000000001fe}) 22:01:10 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) 22:01:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x9, 0x4007, 0x1, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000014c0)={r0, &(0x7f0000000440), &(0x7f00000004c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000040), &(0x7f0000000200)}, 0x20) 22:01:10 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000480), 0xff5d) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000580), 0x0) renameat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0\x00') memfd_create(&(0x7f0000000080)='\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000d40)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000003c0)) geteuid() getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x0, &(0x7f00000004c0)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) preadv(0xffffffffffffffff, &(0x7f0000000380), 0x313, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000d40)=ANY=[], 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000d00)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000880)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000340)) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f00000008c0)=""/98) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000b40)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:01:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000010000000000000"], &(0x7f0000000080)="f30ffd53350efa9837bc0000000000000070e64ac558d7429d727ce4cf", 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 22:01:11 executing program 2: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000380)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:11 executing program 1: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000200)) chdir(&(0x7f0000000100)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r0, 0xc5a) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85714070") r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f0000003300)=""/4096, 0x1000}], 0x2) 22:01:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0xb3) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) 22:01:11 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @loopback}}, 0x5c) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:01:11 executing program 1: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) timer_getoverrun(0x0) keyctl$join(0x1, &(0x7f0000000140)) clock_getres(0x0, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) syz_emit_ethernet(0x0, &(0x7f00000027c0)=ANY=[], &(0x7f0000000240)) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x64) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, &(0x7f0000f40ff8)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f0000000ac0)='pkcs7_test\x00', &(0x7f0000000b00), &(0x7f0000000b40)='veth1\x00', 0xfffffffffffffffa) keyctl$update(0x2, 0x0, &(0x7f0000000b80), 0x0) 22:01:11 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)="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", 0x200002, 0x0) 22:01:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{}, {}, 0x8, {0x2, 0x0, @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdfd]}, 'veth0_to_team\x00'}) 22:01:11 executing program 4: personality(0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/33) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:01:11 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000954000/0x1000)=nil, 0x1000) mremap(&(0x7f0000b76000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000e7b000/0x3000)=nil) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 22:01:11 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000489000/0x4000)=nil, 0x4000, 0x0, 0x8013, r0, 0x0) 22:01:11 executing program 2: unshare(0x20400) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000900)='./file0\x00', 0xa0000080) 22:01:12 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8000000000020481) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x4) write$P9_RCLUNK(r0, &(0x7f00000000c0)={0x7}, 0x3e) 22:01:12 executing program 0: syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @remote, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote, {[@rr={0x7, 0x3, 0x4}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)) 22:01:12 executing program 5: munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) eventfd(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fstat(0xffffffffffffffff, &(0x7f00000005c0)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/69, &(0x7f00000003c0)=0x45) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000540)) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000940)={'mangle\x00', 0x2, [{}, {}]}, 0x48) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000400), 0xc, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:12 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000e40)={0x0, 0x0}, &(0x7f0000000e80)=0xc) setreuid(r1, 0x0) 22:01:12 executing program 0: futex(&(0x7f0000000400), 0xb, 0x4, &(0x7f0000000280)={0x77359400}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000800)=0xc) getpid() syz_open_procfs(0x0, &(0x7f0000000840)='uid_map\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x28, &(0x7f0000000740)}, 0x5) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000500)=0xe8) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)) socket$key(0xf, 0x3, 0x2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000780)) getpid() getpid() getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001380)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000013c0)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000017c0), &(0x7f0000001800)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001a80)) fcntl$getown(0xffffffffffffffff, 0x9) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001ac0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:01:12 executing program 1: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000004c0), 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000100)) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) 22:01:12 executing program 2: setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) request_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffb) add_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000440), &(0x7f0000000480), 0x0, 0x0) request_key(&(0x7f0000000580)='encrypted\x00', &(0x7f00000005c0), &(0x7f0000000600)='l\x00', 0xfffffffffffffffa) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000080), 0x0, 0x0) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000003c0)) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000740), 0xc) keyctl$setperm(0x12, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 22:01:12 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000480)='/dev/loop#\x00', 0x0, 0x82) memfd_create(&(0x7f0000000040)='C\x00k\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x400) 22:01:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f0000000000)=0x80) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000300)=@nfc={0x27, 0x1}, 0x81, &(0x7f0000000080), 0x0, &(0x7f0000000000)}}, {{&(0x7f0000000280)=@in6={0xa, 0x0, 0x4, @loopback}, 0x80, &(0x7f0000000080), 0x1, &(0x7f0000000000), 0x142}}], 0x2, 0x0) 22:01:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000100)=0x8, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e22}, 0x10) 22:01:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000480)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000180), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in6, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000008c0)=0xe8) getgroups(0x0, &(0x7f0000000900)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in=@multicast1, @in=@remote}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000ac0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000005d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) open(&(0x7f0000002b00)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000002b40), &(0x7f0000002b80), &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c00), &(0x7f0000002c40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c80)={{{@in=@multicast1, @in6=@dev}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000002d80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002dc0)) getuid() getegid() stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000000280)) getresgid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getresuid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) getgroups(0x0, &(0x7f0000003080)) fstat(0xffffffffffffffff, &(0x7f00000030c0)) fstat(0xffffffffffffffff, &(0x7f0000003140)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003680)={{{@in, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xdb) fstat(0xffffffffffffffff, &(0x7f00000037c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) getuid() getegid() geteuid() getresgid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getuid() lstat(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)) getuid() getegid() getresuid(&(0x7f00000055c0), &(0x7f0000005600), &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005680), &(0x7f00000056c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000059c0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000005ac0)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005b00)={{{@in6=@remote, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000005c00)=0xe8) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:12 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f00000035c0), 0x0, 0x0, &(0x7f00000036c0)) dup(0xffffffffffffff9c) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000480)="b30000000026d5", 0x0) openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000940)) clock_gettime(0x0, &(0x7f0000000980)) futex(&(0x7f0000000040), 0x0, 0x2, &(0x7f00000009c0)={0x77359400}, &(0x7f0000000a00), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000680)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:01:13 executing program 3: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000840), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/loop-control\x00', 0x0, 0x0) memfd_create(&(0x7f0000000a40)='\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = dup(r0) write(r1, &(0x7f00000000c0)="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", 0x11f) 22:01:13 executing program 2: unshare(0x20400) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000140), &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x3, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) syncfs(r0) 22:01:13 executing program 0: getpriority(0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr\x00') syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in, @in6=@ipv4={[], [], @remote}}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000007c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000940), &(0x7f0000000980)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000b00)={@loopback, @multicast1}, &(0x7f0000000b40)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000bc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000c40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003b40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003b80)={0x0, @dev, @multicast2}, &(0x7f0000003bc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003c00)={{{@in=@multicast1, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000003d00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000009180), 0x0, 0x0, &(0x7f0000009340)={0x0, 0x1c9c380}) getpeername$packet(0xffffffffffffffff, &(0x7f0000009380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000093c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009400)={0x0, @local, @multicast2}, &(0x7f0000009440)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009480)={@empty, @broadcast}, &(0x7f00000094c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009500)={{{@in=@remote, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000009600)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000009800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009840)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000c500), 0x0, 0x0, &(0x7f000000c640)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000c9c0)={{{@in6=@dev, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f000000cac0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000d400)={&(0x7f0000000180), 0xc, &(0x7f000000d3c0)={&(0x7f000000cb00)={0x14}, 0x14}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:13 executing program 2: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1, 0x20}, 0x20) 22:01:13 executing program 1: r0 = memfd_create(&(0x7f0000000300)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 22:01:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[@ANYRESDEC], 0x14) 22:01:13 executing program 4: setfsuid(0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs, &(0x7f00000006c0)=0x6e) pipe2(&(0x7f0000000440), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:01:13 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000c80)={'bond_slave_1\x00', @ifru_map}) 22:01:13 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) ioctl$UI_DEV_CREATE(r0, 0xc00c55ca) 22:01:13 executing program 1: syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0xffffff84, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 22:01:13 executing program 2: getrusage(0x0, &(0x7f00000006c0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:01:14 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x2b, 0x0) 22:01:14 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) munlockall() socket(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e5417545c4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") munlockall() futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000300)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000240)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:14 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x9, 0x9, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={r0, &(0x7f0000000000)="81", &(0x7f0000000180)=""/4096}, 0x18) 22:01:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000dc0000)) ppoll(&(0x7f0000000080)=[{r1}], 0x1, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000100), 0x8) 22:01:14 executing program 4: r0 = socket(0x11, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendto$inet(r4, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r2, &(0x7f0000762fff), 0xfdc7, 0x0, &(0x7f000057bff0)={0x2, 0x4e20, @multicast1}, 0x10) sendto$packet(r0, &(0x7f0000000100), 0x5e0, 0x0, &(0x7f00000001c0)={0x11, 0x8100, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) 22:01:14 executing program 2: mremap(&(0x7f0000d8e000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42804da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) 22:01:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x17f, 0x163) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x229f, 0x4008000, 0x0, 0xb4) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) sched_getscheduler(0x0) setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) getpid() getpgrp(0xffffffffffffffff) getpgrp(0x0) getpid() sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc, 0x80, &(0x7f0000000040)}, 0x0) syz_open_procfs(0x0, &(0x7f0000001640)='net/mcfilter\x00') ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000002700)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x0, {0x2, 0x0, @rand_addr}, 'bpq0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001700)=""/4096) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) syz_execute_func(&(0x7f0000001680)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f8f49c892c842d85d096b2179660f38302fbae5e5e57545972e0ec4010d64ac1e5d31a3b7e29873bb7f") 22:01:14 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x3) ioctl$VT_RESIZE(r0, 0x80047456, &(0x7f0000000040)) 22:01:14 executing program 5: getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) wait4(0x0, &(0x7f00000000c0), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004680), &(0x7f00000046c0)=0xc) getuid() stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000047c0), &(0x7f0000004800)=0xc) getuid() getgroups(0x0, &(0x7f0000000040)) getpid() stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@dev, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@broadcast}}, &(0x7f0000004980)=0xe8) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:01:14 executing program 0: clock_gettime(0x3, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000240)="42805da0c3a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d3123b744dbe2440fc72326f00fbb9500000000") clock_settime(0x0, &(0x7f0000000600)) openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000940)=0x10) getitimer(0x0, &(0x7f0000000300)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000002840)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0), &(0x7f0000000640)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@loopback, @broadcast}, &(0x7f00000006c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001000)={0x0, @remote, @local}, &(0x7f0000001040)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@dev}}}, &(0x7f0000001180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000013c0)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001400)={0x0, @dev, @multicast1}, &(0x7f0000001440)=0xc) accept4(0xffffffffffffffff, &(0x7f0000002880)=@xdp, &(0x7f0000002800)=0x80, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002ac0)={'veth0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003ec0)={&(0x7f00000001c0), 0xc, &(0x7f0000002b00)={&(0x7f0000003b80)={0x14}, 0x14}}, 0x0) getpid() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001a00)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a40)={{{@in=@loopback, @in6=@ipv4={[], [], @local}}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001b40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@dev}, &(0x7f0000000080)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001d00)={0x0, @broadcast, @remote}, &(0x7f0000001d40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in=@remote, @in=@loopback}}, {{@in6=@local}}}, &(0x7f0000001e80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002900)={'bridge_slave_1\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002940)={{{@in, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002a40)=0xe8) 22:01:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)={0xfffbffff80000013}) epoll_pwait(r2, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) 22:01:14 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) sched_getscheduler(0x0) setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) getpid() getpgid(0xffffffffffffffff) getpgrp(0xffffffffffffffff) getpgrp(0x0) getpid() socket$packet(0x11, 0x0, 0x300) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)=@nfc, 0x80, &(0x7f0000000040)}, 0x0) syz_open_procfs(0x0, &(0x7f0000000200)='net/mcfilter\x00') ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000002700)={{0x2, 0x0, @broadcast}, {0x0, @dev}, 0x0, {0x2, 0x0, @rand_addr}, 'bpq0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000080), 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000001700)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001680)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f8f49c892c842d85d096b2179660f38302fbae5e5e57545972e0ec4010d64ac1e5d31a3b7e29873bb7f") 22:01:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000005c0)="1a8c443d3a568c81cc096aa87ddab0f1b182da383fd71795f41053261e63b0b9f1283f7431b6146106716c21b43625f9194bf4b6a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42d6458f97b342303464e94ccb6d6f4f81941e3f3fa371596cdf17e160c992140c9dc81362f019f017", 0x82, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000003b80)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)=""/180, 0xb4}], 0x1, &(0x7f0000000380)=""/160, 0xa0}}, {{&(0x7f0000001680)=@nl=@unspec, 0x80, &(0x7f0000001900), 0x0, &(0x7f0000001940)=""/46, 0x2e}}], 0x2, 0x0, 0x0) shutdown(r0, 0x1) 22:01:15 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000040)}) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sched_getscheduler(0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'team0\x00'}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="0ce138f0d139a05e988c0d8844f2995e", 0x10) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9f3ac69203737c3397c05bd060f38211a40a564a70f277a9e400f01ede5e54175458f8858cf0500000081012e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:01:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x4) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) 22:01:15 executing program 5: chmod(&(0x7f00000002c0)='./file1\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0, &(0x7f0000000180)=@abs, 0x6e) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') syz_execute_func(&(0x7f0000000040)="42805da00fef69dc0f01ee263a200986bdd4c9bdd4c941cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") [ 270.919821] input:  as /devices/virtual/input/input40 [ 270.957978] input:  as /devices/virtual/input/input41 22:01:15 executing program 0: eventfd2(0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000180)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001500)) geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001840)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) fchown(0xffffffffffffffff, 0x0, 0x0) geteuid() ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000280)=""/240) syz_open_dev$evdev(&(0x7f0000000700)='/dev/input/event#\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:01:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f0000000640)={&(0x7f0000000500)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x14, @loopback={0x3f00000000000000}}]}}}]}, 0xff9c}}, 0x0) 22:01:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@setneightbl={0x2c, 0x43, 0x611, 0x0, 0x0, {}, [@NDTA_NAME={0x18, 0x1, 'securityppp1+em1.#\x00'}]}, 0xfd45}}, 0x0) 22:01:15 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r1, &(0x7f0000000300)="040105000500000000000000ffb25bc202938207d903378c398d5375c5f73f2e55067d2780e1", 0x26, 0x0, &(0x7f00000002c0)={0xa, 0x100200004305, 0x800000000000d, @mcast2}, 0x1c) 22:01:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xd4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 22:01:15 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x1006) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=""/130, 0x58}) 22:01:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f000002b000)='./file0\x00', 0x0) creat(&(0x7f0000002500)='./file0/bus\x00', 0x0) lchown(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 22:01:16 executing program 2: listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410f48fa6b20784175452e1a5454f3a7c44379dfb9d6adbe90dfe298c4a27958c9ab") syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000043c0)='syz0\x00') getpgid(0x0) stat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgroups(0x0, &(0x7f0000004300)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004900)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004400)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000004c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) 22:01:16 executing program 3: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwritev(r0, &(0x7f0000003440)=[{&(0x7f0000002400)='I', 0x1}], 0x1, 0x40000) fallocate(r0, 0x0, 0x0, 0x3) 22:01:16 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000000780)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffa) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) getpgid(0xffffffffffffffff) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='gid_map\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000100), 0x0) pselect6(0x40, &(0x7f0000000b00), &(0x7f00000000c0), &(0x7f0000000940), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f00000003c0), 0x8}) clock_gettime(0x0, &(0x7f0000000bc0)) clock_gettime(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0690fef69dc0f01eece9bff8f7f37370f38211ac4c19086d9f28fc9410feefa6b21792463cc63cc4175450f2e1ac4010d64ac1e5d31a3b7c44379df5ed6adbe90dfe2989f8f09f894b034000000") fstat(0xffffffffffffffff, &(0x7f00000001c0)) getresgid(&(0x7f0000000040), &(0x7f0000000340), &(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240), 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000380)) 22:01:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="00f3cdeb8bf8025bfe009344ab") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x200) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000002180)) 22:01:16 executing program 4: futex(&(0x7f0000000300), 0x1, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpid() openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000840)=""/223) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) pivot_root(&(0x7f00000000c0)='./file0/../file0/file0\x00', &(0x7f00000005c0)='./file1\x00') truncate(&(0x7f00000002c0)='./file0/file0\x00', 0x0) open(&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000400)={0x330}, 0x7) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x0, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000600)='./file0/../file0\x00', 0x0, 0x0) getrlimit(0x0, &(0x7f0000000280)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) geteuid() fstat(0xffffffffffffffff, &(0x7f00000007c0)) getresuid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b80)={{{@in6, @in6=@loopback}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@ipv4}}, &(0x7f0000000c80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) lstat(&(0x7f0000000dc0)='./file0/../file0/file0\x00', &(0x7f0000000e00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:01:16 executing program 0: unshare(0x20400) r0 = socket$unix(0x1, 0x1, 0x0) connect$unix(r0, &(0x7f000066fff4)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 22:01:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) pwritev(r0, &(0x7f0000002200), 0x0, 0x0) 22:01:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") shutdown(0xffffffffffffffff, 0x0) 22:01:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000200)="6d656d0001792e737761532e63757272656e7400", 0x0, 0x0) preadv(r1, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x20001000) 22:01:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/netlink\x00') ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f00000000c0), &(0x7f0000000100), 0x8) 22:01:17 executing program 0: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x808000000002, 0x300) getsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) 22:01:17 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x2b}, 0x2, @in=@broadcast, 0x0, 0x3, 0x0, 0x9}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) 22:01:17 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7fffffff}) fcntl$lock(r0, 0x7, &(0x7f00000001c0)={0x1}) 22:01:17 executing program 3: clock_settime(0x0, &(0x7f0000000440)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) mknodat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0x10) epoll_create(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) ptrace$getenv(0x4201, 0x0, 0x0, &(0x7f0000000500)) syz_open_procfs(0x0, &(0x7f0000000580)='fdinfo/4\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@can, 0x80, &(0x7f0000000540), 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000480)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syz_execute_func(&(0x7f00000005c0)="408055a03769ef69dc3641ffaa743223333333c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:17 executing program 0: pipe2(&(0x7f0000000040), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000140)) close(0xffffffffffffffff) timerfd_create(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 22:01:17 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast1, 0xfffffffffffffffc}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 22:01:17 executing program 5: clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000440), &(0x7f0000000540), 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffd) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300), &(0x7f0000000400)='rxrpc_s\x00', 0x0) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000840)) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000700)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000005c0)}}}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000380)) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f00000005c0), &(0x7f0000000780)=0xc) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000540), 0x8) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 22:01:17 executing program 4: lgetxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@random={'os2.', "68d903dad7726c"}, &(0x7f0000000680)=""/246, 0xf6) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) unshare(0x0) pipe2(&(0x7f0000000140), 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) geteuid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(r1, &(0x7f0000000300)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) fcntl$dupfd(r0, 0x0, r0) 22:01:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") socket$inet6(0xa, 0x0, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000480)="980000000000000000cb00", 0x8) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) getpid() 22:01:17 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0), 0x2) 22:01:17 executing program 1: umount2(&(0x7f00000006c0)='./file0/file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) listxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000740)=""/174, 0xae) sigaltstack(&(0x7f0000e00000/0x200000)=nil, &(0x7f00000004c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f00000006c0)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='rose0\x00', 0xfdb7) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f00000001c0)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='tunl0\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) gettid() tgkill(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpgid(0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in6, @in=@rand_addr}}, {{@in=@multicast2}}}, &(0x7f0000000700)=0xe8) getgid() lstat(&(0x7f0000000b00)='./file0/file0\x00', &(0x7f0000000b40)) lstat(&(0x7f0000000bc0)='./file0/file0\x00', &(0x7f0000000c00)) geteuid() getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) 22:01:18 executing program 0: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socketpair$inet6(0xa, 0xe, 0x0, &(0x7f0000000200)) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='security.SMACK64EXEC\x00', &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1e, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000003c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:18 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x4, 0x0) 22:01:18 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @multicast2}}) 22:01:19 executing program 3: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) epoll_create1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000140)={0x3c, 0x7d, 0x0, {0x0, 0x35, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, "", 0x0, "", 0x0, "", 0x2, '{)'}}, 0x3c) clock_gettime(0x0, &(0x7f00000001c0)) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000680)='{)'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6, @in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000800)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380), &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000440)='ceph\x00', &(0x7f0000000640), &(0x7f00000006c0)='filter\x00', 0xfffffffffffffffc) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000004c0)={0x20}, 0x20) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000280)=@add_del={0x2, &(0x7f0000000240)='rose0\x00'}) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ppp\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000540)="42805da0c60fef69dc36f20f78d30c0ace73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:19 executing program 4: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) memfd_create(&(0x7f0000000780)='\\\\\\cpusetproc!eth1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000180)}) keyctl$set_reqkey_keyring(0x10, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0x0) mlock2(&(0x7f00007e0000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x20000000000001fe}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380), &(0x7f00000004c0), 0x0, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, 0x0) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000280)=@add_del={0x2, &(0x7f0000000240)='rose0\x00'}) setxattr$trusted_overlay_origin(&(0x7f0000000600)='./file0/file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000740)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="42805da0c60fef69dc36f20f78d30c0ace73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:19 executing program 5: futex(&(0x7f0000000080), 0x3, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) add_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000340), &(0x7f0000000240), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000940), &(0x7f0000000880), 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), 0x14) clock_gettime(0x0, &(0x7f0000000200)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) clock_nanosleep(0x0, 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000001c0)}}}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000240)) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500), 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:01:19 executing program 1: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) recvmmsg(r0, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=""/95, 0x5f}}], 0x1, 0x140, 0x0) 22:01:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbc, 0xa, 0xffdc}}, &(0x7f0000000240)="4550d4001f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x5, 0x171, &(0x7f0000000000)=""/195}, 0x48) 22:01:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"76000000000000000000009bf300", 0x2003}) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 22:01:19 executing program 2: nanosleep(&(0x7f0000000040)={0x0, 0x989680}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) syz_execute_func(&(0x7f0000000580)="c4223502621dc441f9512fdcf1e233c4635d7b3640420f050fae7000c4c1195c65bf64d828c4e1d5db347c") 22:01:19 executing program 1: r0 = inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x2d59) 22:01:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040), &(0x7f0000000200)='j', 0x1, 0xffffffffffffffff) 22:01:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"76000000000000000000009bf300", 0x2003}) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 22:01:19 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) munlockall() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e5417545c4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") munlockall() syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:19 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd\x00') lseek(r1, 0x0, 0x4) 22:01:20 executing program 3: eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") 22:01:20 executing program 2: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800)={0x2}, &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:20 executing program 0: sysinfo(&(0x7f0000000200)=""/121) eventfd2(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f00000006c0), 0x0, 0x0) setrlimit(0x0, &(0x7f0000000200)) eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:20 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = dup2(r0, r0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000000)) r3 = fcntl$dupfd(r1, 0x0, r1) shutdown(r3, 0x0) 22:01:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:01:20 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080), 0x4) inotify_init1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") keyctl$session_to_parent(0x12) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000140)=""/171) 22:01:20 executing program 5: prctl$void(0x1f) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6}}, {{@in=@remote}}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000001780)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:01:21 executing program 4: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) pipe(&(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000240)={{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@local, @local}, 0x8) socket$nl_generic(0x10, 0x3, 0x10) prctl$intptr(0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x0) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000300)=""/81) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) rt_sigreturn() 22:01:21 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffe87, 0x0) 22:01:21 executing program 2: unshare(0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000300)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000600)='/dev/uinput\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000580)) getresuid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) fstat(0xffffffffffffffff, &(0x7f00000018c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001dc0)='cgroup.procs\x00', 0x2, 0x0) gettid() geteuid() lstat(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003500)={{{@in6=@mcast2, @in6=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000003600)=0xe8) getresgid(&(0x7f0000003640), &(0x7f0000000080), &(0x7f00000036c0)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003700), &(0x7f0000003740)=0xc) stat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003840), &(0x7f0000003880)=0xc) fstat(0xffffffffffffffff, &(0x7f00000038c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003980)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000003a80)=0xe8) stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) lstat(&(0x7f0000003bc0)='./file0\x00', &(0x7f0000003c00)) lstat(&(0x7f0000003c80)='./file0\x00', &(0x7f0000003cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) getuid() getresgid(&(0x7f0000003dc0), &(0x7f0000003e00), &(0x7f0000003e40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) geteuid() stat(&(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000040c0), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000340)={0x0, {{0x2, 0x0, @dev}}}, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syslog(0x0, &(0x7f0000000400)=""/225, 0xe1) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback, 0x0, 0x1, [@rand_addr]}, 0x14) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00003fdff5)={@multicast2, @loopback, @rand_addr}, 0xc) 22:01:21 executing program 5: eventfd2(0x0, 0x0) dup(0xffffffffffffffff) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) epoll_create1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f0000000540)='blacklist\x00', &(0x7f00000004c0), &(0x7f0000000580)='team0\x00', 0x0) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fac461796e04df3821436cf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b21790e25e5e44135450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:01:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x3}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x930, 0x4) sendto$inet(r0, &(0x7f00000002c0)=' ', 0x1, 0x0, &(0x7f0000000200)={0x2, 0x0, @dev}, 0x10) close(r0) 22:01:22 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:22 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) close(r0) 22:01:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@mcast2, 0x800, 0x0, 0x103, 0x2}, 0x20) 22:01:22 executing program 4: keyctl$set_reqkey_keyring(0x7, 0x7) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000300)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getegid() getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000046c0)=0xfffffffffffffe37) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) gettid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000880)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000000c00)) getresgid(&(0x7f0000000c80), &(0x7f0000000cc0), &(0x7f0000000d00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003480)={{{@in6=@loopback, @in=@remote}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000003580)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) geteuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003600)) getuid() getgroups(0x0, &(0x7f0000003640)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:01:22 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000540)=ANY=[@ANYRESOCT], 0x0) timer_create(0x0, &(0x7f0000000080), &(0x7f00000000c0)) getpgid(0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000002c0)=""/1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{}, {0x77359400}}, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) 22:01:22 executing program 5: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000240), &(0x7f0000000040), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:01:22 executing program 0: prctl$void(0x16) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000001780)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:01:22 executing program 5: pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:01:23 executing program 1: clock_settime(0x0, &(0x7f0000000180)={0x0, 0x1c9c380}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") add_key(&(0x7f0000000600)='id_resolver\x00', &(0x7f0000000640), &(0x7f0000000680), 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000700)='.dead\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) getpid() get_robust_list(0x0, &(0x7f00000008c0)=&(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)}}, &(0x7f0000000900)=0x18) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000480)=""/232) fstat(0xffffffffffffffff, &(0x7f0000000280)) setgid(0x0) geteuid() creat(&(0x7f0000000080)='./file0\x00', 0x0) sendto(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001500)) geteuid() syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:01:23 executing program 0: ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) timer_create(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000340)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) utime(&(0x7f00000018c0)='./file0\x00', &(0x7f0000000480)) pipe2(&(0x7f0000001840), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in=@broadcast, @in6=@remote}}, {{@in6}}}, &(0x7f0000001a80)=0xe8) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001ac0)={0x0, 0x1, 0x6, @remote}, 0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x0, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x0, 0x0) futex(&(0x7f00000000c0), 0x0, 0x4, &(0x7f0000000040)={0x77359400}, &(0x7f00000003c0), 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000380), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001b80)="42805da0bd0fef69dc0f01eece738c19fa380f3821c402f5ac10f0817e768cc80000000064660f5970fef00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") 22:01:23 executing program 2: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800)={0x2}, &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:23 executing program 3: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x9) 22:01:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0xc) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast2}, 0x896c4c4831986968) mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, "73797a300000000000000000000000000000000001000000000000000000000000000000000000000000040000000000f9ffffff0000000000000000000000000000000000000000000600"}) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000850028770f80a76be53d237342d85d09f244a4660f38302fbae5e5e57567470fe3ba02d43c28010d64ac1e5d31a3b7e29873bb7f") syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000340)=""/111) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 22:01:23 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x200000005, 0xc, 0xc26, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/144}, 0x18) 22:01:23 executing program 5: unshare(0x8000400) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000040), 0x4) 22:01:24 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3) sendto$inet6(r0, &(0x7f0000000140), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0x5348}, 0x1c) 22:01:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) personality(0x20008) uname(&(0x7f0000000380)=""/176) 22:01:24 executing program 0: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:01:24 executing program 2: r0 = memfd_create(&(0x7f0000000040)="00000600000000000000", 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e"], 0x13) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000280), &(0x7f0000000500), 0x1000) 22:01:24 executing program 5: syz_emit_ethernet(0x0, 0xffffffffffffffff, &(0x7f0000000000)) 22:01:24 executing program 4: clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000540), 0x0, 0x0) request_key(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffd) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) clock_getres(0x0, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@loopback}, &(0x7f0000000bc0)=0x14) fstat(0xffffffffffffffff, &(0x7f0000000280)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000440)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000700)="42805da0120fef69dc0f01eece73fe19fa380f38211af3c4c20d2d6e0cc481b5e5bc2b0000002167f00fbab204000000ca3b2179dae5e541cc75fa1afa1ac4010d64ac1e5d31a3b744dbe271fbc4c2c9062f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:01:24 executing program 5: statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000cc0)=""/4096) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:24 executing program 2: prctl$intptr(0x400000000004, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/tcp6\x00') 22:01:24 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000280)=@nullb='/dev/nullb0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)="6766733200b2190d29d2afb75e24ede14697657bcd228ac73e6b895debf5275af9930856938d7e3f61be3362941f8e51cdbfe316969a77880867861499b183d9c351c97a66d47c65440b30bae4c45b15ab9fbaf6d249e17dd1b5b0914a899d3e4502757a7ad9f10c3506aab8c15c1335f65eae5a0f19512854e900c846f79b61e8688f372ac027a75deb0f7e88a62ff2e721111707aa01184f2def7ec077e926", 0x0, &(0x7f0000000040)='\x00') 22:01:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 22:01:24 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/226, &(0x7f00000002c0)=0xe2) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffffd) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000d40)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f00000004c0)=0xc) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) geteuid() getgroups(0x0, &(0x7f0000000d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000dc0)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in, @in6}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getgroups(0x0, &(0x7f0000002f40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f80), &(0x7f0000002fc0)=0x21d) getgroups(0x0, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:24 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000240)=@getae={0x40, 0x1f, 0x0, 0x0, 0x0, {{@in6=@dev}, @in=@multicast2}}, 0x40}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000006c0), 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @local}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000400)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)}) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @dev}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @local, @broadcast}, &(0x7f0000000500)=0xc) fsetxattr(0xffffffffffffffff, &(0x7f0000000700)=@random={'security.', '/dev/net/tun\x00'}, &(0x7f0000000b00)='system.posix_acl_access\x00', 0x18, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000600)) write$eventfd(0xffffffffffffffff, &(0x7f0000000640), 0x8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000b40)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="42805da0d10fef69dc0d0164ee66620e0f608600088041cb913591913d062900770f7899450f37660f38302f3ae5e575450f2e1a3828c44379dfb9b5d6adf3c990cb90cb9f7f") ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000680)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x10, &(0x7f0000000740)={&(0x7f0000000b40)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000540)) 22:01:24 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x803}) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x7) 22:01:24 executing program 1: futex(&(0x7f0000000100), 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) keyctl$dh_compute(0x6, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000340)={0x90}, 0x90) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000002f00)=""/4096, &(0x7f0000000600)=0x1321) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:01:25 executing program 0: unshare(0x20400) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x40045569, r0) 22:01:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000140)=0xc) 22:01:25 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x29}}, {{@in=@rand_addr, 0x0, 0x6c}, 0x0, @in=@multicast2}}, 0xe8) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) 22:01:25 executing program 5: lgetxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@random={'os2.', "68d903dad7726c"}, &(0x7f0000000680)=""/246, 0xf6) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080), 0x0) unshare(0x0) pipe2(&(0x7f0000000140), 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) geteuid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(r0, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'lo\x00\x00\x00\x00\x00!\x00', &(0x7f0000000240)=@ethtool_drvinfo={0x3, "cdad43542f7c0bb47e10ee0051628520042e2893a7295da8d0bd57f733438b55", "fe179afd0eda5c131ba5bd6394c1a7a0bb28293a07d927982f30e4acb3489cee", "720267e4762bb6031439bed846ead4622e291c8291e43260569b20cb639bd0d6", "7f671b90362a24ee4fb5a88d449e3acf49b2023eb4e51fb29163d325ae32828b", "e5ca687464273ec96cc5c0bce2a63dfe4175c631154277d32853b60def730df1", "c15ca7a6e1daf58dabe1c160"}}) 22:01:25 executing program 0: prctl$void(0x15) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6}}, {{@in=@remote}}}, &(0x7f0000000580)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/31, 0x1f, 0x0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000002c0)="42805da0ad5252ef84dc0f01eece67f3406e660c54f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") getrlimit(0x0, &(0x7f0000000040)) 22:01:26 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000000c0)=0x2, 0x4) 22:01:26 executing program 4: request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000080)) getrandom(&(0x7f00000006c0)=""/148, 0x82, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500)) dup(0xffffffffffffffff) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffc) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240), 0xc, &(0x7f00000005c0)={&(0x7f0000001880)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/252) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:26 executing program 1: pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)) wait4(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)) timer_create(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, @thr={&(0x7f00000001c0), &(0x7f0000000200)}}, &(0x7f00000002c0)) timer_delete(0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x2) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000140)=0xc) getpid() fstat(0xffffffffffffffff, &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) setreuid(0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000080)}, 0x10) syz_execute_func(&(0x7f0000000540)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:01:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, &(0x7f0000000840), 0x0, &(0x7f0000000300)}}], 0x4000000000001fe, 0x0) 22:01:26 executing program 5: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@mcast1, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x807}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000040)=[{0x18, 0x29, 0xb, "a2"}], 0x18}}], 0x1, 0x0) 22:01:26 executing program 0: eventfd2(0x0, 0x2) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000700)) clock_gettime(0x0, &(0x7f0000000740)) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") add_key(&(0x7f0000000340)='cifs.idmap\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffff9) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:01:26 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) getpid() openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000200)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000000)) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:01:26 executing program 2: eventfd2(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@loopback, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000004c0)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000440)={0x7c, 0x7d, 0x0, {{0x0, 0x66, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xa, '/dev/zero\x00', 0x2, '--', 0xb, 'eth0vmnet0{', 0x1c, 'bdevGPLnodev+!nodevsecurity/'}, 0x1, '='}}, 0x7c) fchmod(0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000000c0)) mmap(&(0x7f00009a4000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mmap(&(0x7f0000b58000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) 22:01:26 executing program 0: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 22:01:26 executing program 1: timer_create(0xa, &(0x7f0000000b80), &(0x7f0000000800)) 22:01:26 executing program 4: request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000080)) getrandom(&(0x7f00000006c0)=""/148, 0x82, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000500)) dup(0xffffffffffffffff) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffc) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000240), 0xc, &(0x7f00000005c0)={&(0x7f0000001880)=ANY=[]}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000880)=""/252) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@delqdisc={0x24, 0x25, 0x92704640c614a153, 0x0, 0x0, {0x0, r2, {}, {0xffff}}}, 0x24}}, 0x0) 22:01:27 executing program 3: clock_getres(0x6, &(0x7f0000000180)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000b00)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000b40), 0x10) chmod(&(0x7f0000000540)='./file0\x00', 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000400)=""/234, 0xea, 0x0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000600)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000ac0)) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000a40)) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000040)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000640)=""/210, 0xd2, 0x0, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) 22:01:27 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f0000002fc0), 0x0, 0x0, &(0x7f00000030c0)={0x0, 0x989680}) getsockname(0xffffffffffffff9c, &(0x7f0000003100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003180)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000031c0)={@loopback, @multicast2}, &(0x7f0000003200)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003240)={0x0, @multicast2, @multicast1}, &(0x7f0000003280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@broadcast, @in=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003540)={'veth0_to_bridge\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003640)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003740)={@local, @remote}, &(0x7f0000003780)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000037c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f00000038c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003940)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000039c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003a00)={@empty, @multicast2}, &(0x7f0000003a40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003e40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003ec0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003f00)={{{@in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000004000)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:01:27 executing program 2: getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006b00), &(0x7f0000006b40)=0xc) getresgid(&(0x7f0000006b80), &(0x7f0000006bc0), &(0x7f0000006c00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000006c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006c80)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000006d80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006dc0)) stat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) lstat(&(0x7f0000006ec0)='./file0\x00', &(0x7f0000006f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009200), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42804da0c6330f0122cec273fe660fef74a409387c3667f9460738286a006bf081768c34c88e230000230000e5bc2b00000021f3e12dba32047000002a0fa20fa2210b0000002e64436e79dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:27 executing program 5: syz_emit_ethernet(0x0, &(0x7f0000000880)=ANY=[], &(0x7f0000000440)) recvmmsg(0xffffffffffffffff, &(0x7f00000035c0), 0x0, 0x0, &(0x7f00000036c0)) dup(0xffffffffffffff9c) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000480)="b30000000026d5", 0x0) openat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:01:27 executing program 0: unlink(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$get_keyring_id(0x0, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000280)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) getgroups(0x0, &(0x7f00000001c0)) setgroups(0x0, &(0x7f0000000280)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000400), 0x4) getegid() getegid() setresgid(0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local, @broadcast}, &(0x7f0000000300)=0xc) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000340)={@dev}, 0x14) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000040)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") 22:01:27 executing program 4: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) uname(&(0x7f0000000b00)=""/200) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211a360fc2694d52df9086fbd9f28f27c461d25d53a6c421301698000000004c42e145bd10167ea70075a7a0002375fb44ddefc6c62e1a55010d64ac1e5d") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) request_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300), &(0x7f0000000340)='vmnet1-\x00', 0xfffffffffffffffc) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000003c0)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') 22:01:28 executing program 2: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getpid() ustat(0x0, &(0x7f0000000080)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='./file0\x00') openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") keyctl$join(0x1, &(0x7f0000000540)) syz_execute_func(&(0x7f0000000740)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5d3c5562b2b0f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:01:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x5437, 0x0) 22:01:28 executing program 1: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 22:01:28 executing program 5: clock_gettime(0x0, &(0x7f0000000080)) nanosleep(&(0x7f0000000100), 0x0) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f00000005c0)="f5568055a07a7a69ef69dc00d990c841ff0fc4017b2d11c642651d69ca38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5dc422699ea9000000807f") socket$nl_netfilter(0x10, 0x3, 0xc) 22:01:28 executing program 1: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000ac0)='pkcs7_test\x00', &(0x7f0000000b00), &(0x7f0000000b40)='veth1\x00', 0xfffffffffffffffa) keyctl$update(0x2, 0x0, &(0x7f0000000b80), 0x0) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840), &(0x7f0000000880)=0x14) accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, &(0x7f0000000040)=0xfffffffffffffc35, 0x0) seccomp(0x0, 0x0, &(0x7f00000007c0)={0x0, &(0x7f0000000780)}) 22:01:28 executing program 2: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), &(0x7f00000008c0)=0x4) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000007c0), 0xc) bind(0xffffffffffffffff, &(0x7f0000000b80)=@l2, 0xffffffffffffffb9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) lchown(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:29 executing program 3: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:29 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f00000002c0)=0x1df) 22:01:29 executing program 4: getrusage(0xffffffffffffffff, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000000300)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006b00), &(0x7f0000006b40)=0xc) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000006c00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000006c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006c80)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@remote}}, &(0x7f0000006d80)=0xb0) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006dc0)) stat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) lstat(&(0x7f0000006ec0)='./file0\x00', &(0x7f0000006f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009200), 0x0, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42804da0c6330f0122cec273fe660fef74a409387c3667f9460738286a006bf081768c34c88e230000230000e5bc2b00000021f3e12dba32047000002a0fa20fa2210b0000002e64436e79dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:29 executing program 0: clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000540), 0x0, 0x0) request_key(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffd) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000180)) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) clock_getres(0x0, &(0x7f0000000200)) clock_getres(0x0, &(0x7f0000000400)) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000700)="42805da0120fef69dc0f01eece73fe19fa380f38211af3c4c20d2d6e0cc481b5e5bc2b0000002167f00fbab204000000ca3b2179dae5e541cc75fa1afa1ac4010d64ac1e5d31a3b744dbe271fbc4c2c9062f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 22:01:29 executing program 0: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000440)) getresgid(&(0x7f00000003c0), &(0x7f00000004c0), &(0x7f0000000500)) socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") fstat(0xffffffffffffffff, &(0x7f0000000540)) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:01:29 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xd1, &(0x7f0000000000)={{0x5f5e0ff, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x4) getsockopt$inet6_buf(r0, 0x29, 0xd0, &(0x7f0000000100)=""/66, &(0x7f0000000240)=0x42) 22:01:29 executing program 5: keyctl$set_reqkey_keyring(0x7, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000cc0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001dc0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x0, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000020c0), &(0x7f0000002100), &(0x7f0000002140)) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) lstat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000006800)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006a40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 22:01:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff9a) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000300)) 22:01:29 executing program 1: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000001640)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:01:29 executing program 2: epoll_create1(0x2110000000000001) getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:01:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000009c0)=ANY=[], 0xfffffe51) shutdown(r0, 0x1) 22:01:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=@dstopts, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000001c0)=""/4096, &(0x7f0000000000)=0x1000) 22:01:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8942, &(0x7f00000002c0)={'teql0\x00', @ifru_ivalue}) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000140)={0x60}, 0x60) sched_setscheduler(0x0, 0x0, &(0x7f00000000c0)) 22:01:30 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = creat(&(0x7f0000002500)='./file0/bus\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) 22:01:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 22:01:30 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)="0203516ff5792e6576653ab05166a496686e7473008b010c627a9b86973e6e1836b3fcda9f5f21e3aadf345c53c7202108ded164d6", 0x26e1, 0x0) clone(0x8000802102001ff7, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000080)) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000200)=""/213) 22:01:30 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000015c0)=""/4096) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad43d9f242d85d0966430f6ca3860000000f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29871bb7f") 22:01:30 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066410f55a4e088d557207c2a06c46129ef950000002140a564a70f157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:01:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200240, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x3000200) 22:01:30 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, {{@in=@multicast2}, 0x0, @in=@local}}, 0xe8) 22:01:30 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mknod$loop(&(0x7f0000000080)='./file0/file1\x00', 0x0, 0xffffffffffffffff) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x10044}}, 0x50) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000030c0), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) write$FUSE_ENTRY(r0, &(0x7f0000003000)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85e7}}}, 0x90) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 22:01:30 executing program 4: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0x2, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) unshare(0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) dup(0xffffffffffffffff) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000440)=0x1c) getpeername$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") getpgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000200)={0x5e4, &(0x7f0000000080)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'nat\x00', 0x2, [{}, {}]}, 0x48) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000004c0)=0x1c) clock_nanosleep(0x0, 0x0, &(0x7f0000001640)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:30 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x0, 0x0, &(0x7f0000000040)) 22:01:30 executing program 5: getitimer(0x0, &(0x7f00000000c0)) pipe2(&(0x7f0000000140), 0x0) sched_yield() setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000780), 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000500)=""/62) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@generic) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da0be0fef69dc0f01eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f06ebab204000000cac441795b64ae01dae5f3460f58f975450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6, @in6}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000f40)=0xe8) getgroups(0x0, &(0x7f0000000f80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000fc0)) stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) getgroups(0x0, &(0x7f00000025c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getpgrp(0x0) geteuid() getgroups(0x0, &(0x7f0000002840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000028c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000002880)='rose0\x00'}, 0x30) getresuid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getgroups(0x0, &(0x7f00000029c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f00000041c0)) getgroups(0x0, &(0x7f0000004240)) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f0000004280)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004500)={{{@in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004600)=0xe8) getegid() getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000004640)) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000047c0)={{{@in6=@remote, @in=@dev}}, {{@in=@loopback}}}, &(0x7f00000048c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004900)) 22:01:31 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setuid(0x0) 22:01:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000000)) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x3, &(0x7f0000000140)={0x0, {{0x2, 0x0, @multicast1}}}, 0x8c) 22:01:31 executing program 1: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x2000)=nil, 0x2000, 0x0, 0x4011, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) dup2(r0, r1) 22:01:31 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xce, &(0x7f0000000040), &(0x7f0000000080)=0x4) 22:01:31 executing program 0: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:31 executing program 4: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000000700)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe2(&(0x7f0000000340), 0x0) gettid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f00000006c0)="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") getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000000400)='mountstats\x00') memfd_create(&(0x7f0000000040)='(@.\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000200)) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000140)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a05e6969ef69dc00d9e3af0fe1ff6920375137c339b52a8e0f38c4c37c6d9ea80000004edba564a70f97f20f2bac090d000000bb00000040428fb07e6767e5417545800f2e8f0850cc293201460f01ee420f820e000000262e6426f30f2b050974020027") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) memfd_create(&(0x7f0000000280)="6e65b837759a64701cf80b04f5008197f12f166c80cf2422ae08d514c9a2f51f5572bc92f266f1ae07bb8826b481443e98cfbe9f4acfbb88fd27bca48a119a58420d228700b787159bf97cc00c48c68eebc1de4a8c4405f588d9a7b8fb85de572541cc6ceeadbf963770b1196a7ed8af031083d8f2fc6d376900de7d495fff8e3faf441cf72e33ae59bae21303055ea63ed29781ed03d321728c61c85ab59bc7753a2b2dcc83dc3e10c381351cb95e8eed86f9856fc1b9f95b16463672ed4d97a91635cfc1c9de8c6c7972ee6a81de126371f1950eb42678aa6bd73fd5603b97b2c9aeda569f50f8c4b852ed5e891ca6bf2893c9fb3030c5822475d86168f0ac0c73729c2376d66c", 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f00000003c0)=0xc) write$9p(0xffffffffffffffff, &(0x7f0000000640), 0xfffffecf) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f00000002c0)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000180)={'bcsf0\x00', {0x2, 0x0, @rand_addr}}) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000940)={0x0, {{0x2, 0x0, @dev}}}, 0x88) keyctl$invalidate(0x15, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f0000000040)}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000140)={'veth0_to_bond\x00', {0x2, 0x0, @dev}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) 22:01:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f00000001c0)="ba776c63ef07f28f40892a61f4273a6125244065746831215d00") 22:01:31 executing program 5: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5410f71e2006766f342cd570f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:01:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000580)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0726969ef69dc00d93affff203737c3397c2a060f38211a40a564a70f157a9e400f01ef6f62010d42002e1a1a3ef0f658550166dbc931a34eb786529898c4227992749f55") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000140)=0xc) getgid() getegid() ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000280)) getgroups(0x0, &(0x7f0000000200)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000240)) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 22:01:31 executing program 1: waitid(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000480)) clock_settime(0x0, &(0x7f0000000600)) pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) sync() eventfd2(0x0, 0x0) epoll_create1(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='.\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000280)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@mcast1}, &(0x7f0000000440)=0xffffffffffffff32) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6, @remote}, 0x10) getpgid(0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000002c0), 0x4) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040), 0x2c) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000400), &(0x7f00000000c0)}, 0x20) 22:01:31 executing program 2: recvfrom$inet(0xffffffffffffffff, &(0x7f00000001c0)=""/33, 0x21, 0x0, &(0x7f0000000200), 0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) geteuid() getrusage(0x0, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f0000000180)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000000)) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000001c0)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000040)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000500)) fchown(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@rand_addr}}}, &(0x7f0000000380)=0xe8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000005c0)=""/4096) lookup_dcookie(0x0, &(0x7f0000000580)=""/61, 0x3d) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) syz_execute_func(&(0x7f00000000c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:31 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000180)={0xa, 0xfffffffffffffffd, 0x0, @mcast1, 0x80000000c}, 0x1c) getpeername(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000000)=0x80) 22:01:32 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', '.\x00'}, &(0x7f00000000c0)=""/12, 0xc) 22:01:32 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f00000000c0)) 22:01:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000180), 0x744d4a64e9fd60a5, 0xffffffffffffffff) 22:01:32 executing program 1: utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) pipe(&(0x7f00000001c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:32 executing program 5: getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xfffffffffffffffa) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$get_keyring_id(0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) gettid() getpgrp(0x0) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:32 executing program 4: getpeername(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tpin6, &(0x7f00000001c0)=0x80) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in=@dev}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000880)=0xe8) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:01:32 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0)=0x7ee, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0xfffffffffffffe58, &(0x7f0000000000), 0x0, &(0x7f0000000040)=""/81, 0x51}, 0x40002102) 22:01:32 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000380), &(0x7f0000000140), &(0x7f0000000340)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f0000000600)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f0000000540)) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000440), &(0x7f0000000540), 0x0, 0xfffffffffffffffb) rt_sigpending(&(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000380)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000480)) getegid() getegid() syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") pipe2(&(0x7f0000000040), 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) 22:01:32 executing program 2: clock_gettime(0x6, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioprio_get$pid(0x0, 0x0) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 22:01:33 executing program 1: unshare(0x0) getpid() openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @multicast2, @dev}, &(0x7f0000001400)=0xc) recvmsg(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001480)=@hci, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000001640)=""/88, 0x58}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0876969effb69dcfdd9d94e8f044ab9003c80203c80207fb432322333331837370f38211ac4c19086d9f28fc965670f19c54e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f07b80802403cec4c229f7014b") 22:01:33 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00'}) [ 288.606993] input: syz1 as /devices/virtual/input/input44 [ 288.645596] input: syz1 as /devices/virtual/input/input45 22:01:33 executing program 3: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) memfd_create(&(0x7f0000000180)="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", 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$inet6(0xa, 0x3, 0x0) 22:01:33 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000380), &(0x7f0000000140), &(0x7f0000000340)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f0000000600)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f0000000540)) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000440), &(0x7f0000000540), 0x0, 0xfffffffffffffffb) rt_sigpending(&(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000380)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000480)) getegid() getegid() syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") pipe2(&(0x7f0000000040), 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) 22:01:33 executing program 5: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800)={0x2}, &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) dup(0xffffffffffffffff) fdatasync(0xffffffffffffffff) request_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f0000000300), &(0x7f0000000380)='\x00', 0xfffffffffffffffb) request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200), &(0x7f0000000240)='em0cgroup\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:33 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x1) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000040), 0x28000000) 22:01:33 executing program 4: getpgid(0xffffffffffffffff) get_robust_list(0x0, &(0x7f00000005c0)=&(0x7f0000000580)={&(0x7f0000000300), 0x0, &(0x7f00000004c0)={&(0x7f0000000380)}}, &(0x7f0000000600)=0x18) clock_getres(0x0, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@dev, @in=@multicast2}}}, &(0x7f0000000240)=0xe8) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast1, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgroups(0x0, &(0x7f0000000940)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @empty, @loopback}, &(0x7f00000001c0)=0xc) getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) getegid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000b80)=ANY=[], 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$void(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:01:33 executing program 2: pipe(&(0x7f0000000140)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000540)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f00000000c0)=0x80) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) prctl$void(0x0) socketpair$inet6(0xa, 0xe, 0x0, &(0x7f0000000200)) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='security.SMACK64EXEC\x00', &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1e, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000003c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) 22:01:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/84, 0x54}, {&(0x7f0000000300)=""/9, 0x9}], 0x2, 0x0) 22:01:34 executing program 1: r0 = socket(0xa, 0x1, 0x0) close(r0) fstat(r0, &(0x7f0000000980)) 22:01:34 executing program 1: prctl$void(0x1f) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000480)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6, @in6}}, {{@in=@remote}}}, &(0x7f0000000580)=0xe8) bind(0xffffffffffffffff, &(0x7f0000000140)=@ethernet={0x0, @broadcast}, 0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000001780)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") getrlimit(0x0, &(0x7f0000000080)) 22:01:34 executing program 0: socket$inet6(0xa, 0x2, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000380), 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000340)='net/ipx\x00') syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000007680)) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff2e0ac4010d64ac1e5d31a314b706e298987b7f") bind$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, 0x1c) 22:01:34 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x1, 0x1}, 0x2c) 22:01:35 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000080)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f00000000c0)='./file0/bus\x00', 0x40, 0x0) mkdir(&(0x7f0000000200)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r0, &(0x7f0000000280)='./file0\x00', 0x0) 22:01:35 executing program 5: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="7f7070703173656c6600", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) prctl$void(0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x50, &(0x7f0000000380)}, 0x10) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000240)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:35 executing program 2: creat(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') read(r0, &(0x7f0000000040)=""/230, 0x20000126) mount(&(0x7f00000001c0)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)=',') 22:01:35 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000180)={'veth1\x00', @ifru_settings={0x0, 0x0, @fr_pvc=&(0x7f00000000c0)}}) 22:01:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/136, &(0x7f00000001c0)=0x88) 22:01:35 executing program 0: ioctl$BLKBSZSET(0xffffffffffffffff, 0x40041271, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 22:01:35 executing program 4: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x40002cc, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000003100)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000540), 0x0, &(0x7f00000009c0)}, {&(0x7f0000001b00)=@abs, 0x6e, &(0x7f0000003040), 0x0, &(0x7f00000030c0)}], 0x2, 0x0) 22:01:35 executing program 1: rt_sigtimedwait(&(0x7f0000000340), &(0x7f0000000400), &(0x7f0000000480), 0x8) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200), 0xc) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) 22:01:35 executing program 0: r0 = socket(0x1e, 0x400000000000004, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x0, 0x73d}, 0x29b) r1 = memfd_create(&(0x7f00003ce000)='}\x00', 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r1, 0x0) sendto$inet6(r0, &(0x7f0000000000), 0x101d0, 0x0, 0x0, 0x0) 22:01:35 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x1c) 22:01:35 executing program 0: socket$unix(0x1, 0x7a345de2f1e03432, 0x0) clock_gettime(0x0, &(0x7f0000000480)) clock_gettime(0x0, &(0x7f0000000540)) clock_settime(0x0, &(0x7f00000004c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000680)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:01:35 executing program 2: keyctl$set_reqkey_keyring(0xa, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') clock_gettime(0x0, &(0x7f0000000600)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f00000005c0), &(0x7f00000000c0), 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) munlockall() syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) inotify_init() unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) dup(0xffffffffffffffff) pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da051c4220daf9e5e7eaf2747dd93c15a00000dde41cbff9191a33d062900770f78993d233d2341150f6eee6239f6f6fa39f60f383027c4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000340), &(0x7f00000001c0)="1f706365737300", 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000040), 0xa) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) 22:01:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x2, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000000)) close(r2) 22:01:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_int(r0, 0x1, 0xd, &(0x7f0000000140), &(0x7f0000001080)=0x4) 22:01:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.opaque\x00', &(0x7f0000000240)=""/69, 0x45) 22:01:36 executing program 5: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000200)="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", 0xfc) 22:01:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000200)={&(0x7f0000000340)=@ipv6_getroute={0x1c, 0x1a, 0x205, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}}, 0x1c}}, 0x0) 22:01:36 executing program 4: unshare(0x3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) syz_open_procfs(0x0, &(0x7f0000012a80)='sched\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xc3) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) getpriority(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000780)=0xe8) getgid() sendmsg$netlink(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000280), 0xc, &(0x7f0000000480), 0x0, &(0x7f0000004680)}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000ea80), 0x0, 0x0, &(0x7f000000ec80)={0x77359400}) sendmmsg(0xffffffffffffffff, &(0x7f0000000280), 0x400001a, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") 22:01:36 executing program 1: inotify_init1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f") 22:01:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x0) 22:01:36 executing program 2: clock_getres(0x40020004, &(0x7f0000000040)) pipe2(&(0x7f0000000180), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) unshare(0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@local, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@local, @in=@local}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000840)=0xe8) geteuid() getgroups(0x0, &(0x7f0000000880)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) getresgid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000c80)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000500)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455d2ebc2ebc0d64ac1edde3e37f") seccomp(0x0, 0x0, &(0x7f0000000100)) 22:01:36 executing program 5: clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) getpid() wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000000c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000004c0)={0x0, &(0x7f0000000480)}, 0x10) epoll_create(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)) readahead(0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$peekuser(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040), 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @broadcast, @remote}, &(0x7f0000000640)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @empty, @multicast1}, &(0x7f0000000cc0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@remote, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'ip6tnl0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000015c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001600)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001640)=@xdp, &(0x7f00000016c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'team0\x00'}) accept4(0xffffffffffffffff, &(0x7f00000019c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001a40)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a80)={{{@in=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000001b80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001bc0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000001dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001e00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002580)={'ifb0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002600)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005b00)={{{@in=@remote, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000005c00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005d00)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006500)={&(0x7f0000000500), 0xc, &(0x7f00000064c0)={&(0x7f0000005d40)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)) syz_execute_func(&(0x7f00000005c0)="408055a03769ef69dc3641ffaa743223333333c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000240)) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") 22:01:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') lseek(r0, 0x2, 0x0) 22:01:36 executing program 0: socket$inet6(0xa, 0x803, 0x2000000003) recvmmsg(0xffffffffffffffff, &(0x7f0000008e80), 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000009580)=ANY=[], &(0x7f0000009180)) epoll_create(0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x15d, &(0x7f0000000180)}) getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) io_setup(0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000a80)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/route\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000440), 0x2c) memfd_create(&(0x7f00000014c0)='nodev\x00', 0x0) dup(0xffffffffffffffff) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @dev}, @in=@remote}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xfffffffffffffe5d) io_submit(0x0, 0x0, &(0x7f0000001600)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000940)) getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a40)) stat(&(0x7f0000004940)='./file0\x00', &(0x7f0000000ac0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b40)) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f00), &(0x7f0000000f40)=0xc) getresgid(&(0x7f0000000f80), &(0x7f0000000fc0), &(0x7f0000001000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 22:01:37 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getpgid(0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200)=""/196, &(0x7f00000000c0)=0xc4) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:01:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_buf(r0, 0x1, 0x3b, &(0x7f00000000c0)=""/114, &(0x7f0000000000)=0x72) 22:01:37 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000200)) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f00000002c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) request_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080), &(0x7f00000000c0)='security^cpuset^,md5sum\x00', 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") 22:01:37 executing program 2: ppoll(&(0x7f0000000000), 0x117, &(0x7f0000000040), &(0x7f0000000500), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) dup(0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) prctl$intptr(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="637007006363742e75736167655f757365720035cec651a08192cc6694a1414a857b522ed97a57360b9b02bd54b3fd8684dd7a73846af6f711f5015b00a34f6b04831a9c22ac0419d90b7ea87d822bd61e8de1fd31c88a4e31477a87ef06c92fdbaf2a0f032dcf942c96993fb1c6ab6aac8f5f", 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000400)={0x60}, 0x60) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000640)) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000140)=""/253) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) getresgid(&(0x7f0000000240), &(0x7f0000000380), &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") write$evdev(0xffffffffffffffff, &(0x7f0000000280), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgid() clock_gettime(0x0, &(0x7f00000001c0)) 22:01:37 executing program 5: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffc) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'vlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'team0\x00'}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000680), 0xffffffffffffffff) pipe2$9p(&(0x7f0000000180), 0x0) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000580)={'ipddp0\x00', {0x2, 0x0, @broadcast}}) unshare(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) pipe2(&(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000280)={@mcast1}, &(0x7f00000002c0)=0x14) prctl$getname(0x10, &(0x7f0000000180)=""/39) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000300)={@loopback}, &(0x7f0000000340)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@ipv4={[], [], @local}}, &(0x7f00000003c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast2}}}, &(0x7f0000000680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000700)=0x14) lstat(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000400)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)) 22:01:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) recvfrom(r0, &(0x7f0000000040)=""/78, 0x4e, 0x2000, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80) 22:01:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x5, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @dev}}}, 0x1cb) 22:01:37 executing program 4: chroot(&(0x7f0000000080)='./file0\x00') msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) clock_gettime(0x0, &(0x7f0000000340)) getpgid(0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000200), 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)=""/242, 0xf2) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:37 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrusage(0x0, &(0x7f00000009c0)) 22:01:37 executing program 0: select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) dup(0xffffffffffffffff) fdatasync(0xffffffffffffffff) request_key(&(0x7f0000000280)='cifs.spnego\x00', &(0x7f0000000300), &(0x7f0000000380)='\x00', 0xfffffffffffffffb) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={0x0, {{0x2, 0x0, @broadcast}}, {{0x2, 0x0, @multicast1}}}, 0x108) request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000200), &(0x7f0000000240)='em0cgroup\x00', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000440), 0x0, 0x0) unshare(0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) eventfd2(0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000006c0)=""/156, &(0x7f00000003c0)=0x9c) syz_execute_func(&(0x7f0000000340)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:38 executing program 2: clock_getres(0x0, &(0x7f00000001c0)) times(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000240)=0xc) tgkill(0x0, 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) getpgrp(0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000140)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b766400f3a14150008000011f0802403088e9fa3a74b") 22:01:38 executing program 5: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x32}, 0x0, @in6=@loopback}}, 0xe8) sendmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001680)}, 0x0) 22:01:39 executing program 3: seccomp(0xfffffffffffffffc, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:39 executing program 1: socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000340), &(0x7f0000000140)="19", 0x1, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000000c0), &(0x7f0000000400)="d622a6f1bc81f5a9625b5a9e9b07ec8d140ae917c808c67736d90c495a261a541520a6a14eb33679b0277b073bd22593d066c5668d4f43f92555e0332c09ddfbf9a13eff08da161d559bbdda9661d258e59c3ba4ace60f3f1aeb35b898f52c7c66f86a70bb7398340fbe7cc9368a87f08cc81b762166e38ba0ce1cd1456f7f64c37bc69cdd8e00000080000000008ce5850e8ae1d741e7f3b4404075fdceadeeeab14b5df045d298c31e4c4072ae1d90d956898e12c3aa5778f7f678229dcd6da7cd583cf1c3f7e11c", 0xc9, r1) keyctl$dh_compute(0x17, &(0x7f00000001c0)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x3ca, &(0x7f0000000180)={&(0x7f00000002c0)={'sha1-generic\x00'}}) 22:01:39 executing program 5: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000340)=""/226, &(0x7f00000002c0)=0xe2) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffffd) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000d40)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f00000004c0)=0xc) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) geteuid() getgroups(0x0, &(0x7f0000000d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000dc0)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in, @in6}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getgroups(0x0, &(0x7f0000002f40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f80), &(0x7f0000002fc0)=0x21d) getgroups(0x0, &(0x7f00000002c0)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000005c0)={@loopback}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:01:39 executing program 4: r0 = socket$inet(0x2, 0x6000000000000001, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x0, @dev}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='syzkaller0\x00'}) 22:01:39 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') recvmsg(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/244, 0xf4}, 0x0) clock_gettime(0x0, &(0x7f0000000280)) socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[]}}, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) getpgrp(0xffffffffffffffff) getpgid(0x0) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000001d80)='vcan0\x00'}, 0x30) 22:01:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)={@multicast2, @local, 0x1, 0x0, [@dev, @multicast1, @multicast2]}, 0x338) 22:01:39 executing program 1: mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000340)=""/165) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getgroups(0x0, &(0x7f0000000240)) getpgrp(0x0) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getgroups(0x0, &(0x7f0000000400)) timer_create(0x0, &(0x7f0000000080), &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:01:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='#! ./file0 ppp0(proc#vboxnet'], 0x1c) 22:01:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000180)="025cc80700145f8f764070") bind$inet(r0, &(0x7f00000000c0)={0x2, 0x804e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x803, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000240), 0x4) 22:01:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7, 0x1, 0x1, 0x8}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000080)}, 0x10) 22:01:39 executing program 2: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000001d00)='net/rfcomm\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d80)=0x14) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f00000016c0)) fstat(0xffffffffffffffff, &(0x7f0000000d00)) getgroups(0x0, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000000080)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)={'syz1'}, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 22:01:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2800000000000000290000000200000000e46e0337a6dd45460000000000000000000077e0734c00"], 0x28}, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001600)=[{0x5}], 0xc}}], 0x488, 0x0) 22:01:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000140)) 22:01:40 executing program 4: r0 = socket$inet(0x2, 0x3, 0x8) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f00000004c0)=[{0x10, 0x0, 0x1}], 0x10}}], 0x1, 0x0) 22:01:40 executing program 5: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x0) keyctl$describe(0x6, r0, &(0x7f0000000340)=""/4096, 0x1000) 22:01:40 executing program 0: unshare(0x20400) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) 22:01:40 executing program 2: r0 = socket(0x11, 0x80002, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) fcntl$setstatus(r0, 0x4, 0x2800) syz_emit_ethernet(0x32, &(0x7f0000000040)={@local, @broadcast, [], {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @dev, "825933e310b03a7d396c2bd0302215a0"}}}}, 0x0) 22:01:40 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"00ac720000000000ec973f820f7c4000", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'gre0\x00', 0x400}) close(r0) 22:01:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040), 0x0, 0x0, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r0, 0x5) keyctl$set_timeout(0xf, r0, 0x0) 22:01:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000e80)={@mcast2, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x7f}, 0x20) 22:01:40 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002600)='/proc/self/net/pfkey\x00', 0x0, 0x0) unshare(0x20400) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000002640)) 22:01:40 executing program 5: ioprio_set$uid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000000c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000005c0)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) lsetxattr$trusted_overlay_upper(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)='trusted.overlay.upper\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x0) ioprio_get$pid(0x0, 0x0) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000400)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_setparam(0x0, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000003c0)}) pwrite64(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000280), 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000880)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000840)={0xe, 0x7, 0x0, {{0x1, '^'}}}, 0xe) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000480), 0xc, &(0x7f00000007c0)={&(0x7f0000000740)={0x14}, 0x14}}, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000002c0)={0xffffffffffffff8b}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d096b2179660f38302fbae5e5e575440f2e581a010d64ac1e5d31a3b7e29873bb7f") 22:01:40 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x0) openat(0xffffffffffffffff, &(0x7f0000000680)='./file0\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) perf_event_open$cgroup(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000001680)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair(0x0, 0x0, 0x0, &(0x7f0000000d00)) clone(0x0, &(0x7f0000000640), &(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) sendmmsg(0xffffffffffffffff, &(0x7f0000001480), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0), &(0x7f0000000700)='team0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)) set_tid_address(&(0x7f0000000440)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'bcsf0\x00', @ifru_ivalue}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000400), 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000480)=""/81) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) 22:01:40 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000140)="0a5cc80700315f85715070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@remote, 0x3}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000200)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}, 0x2}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') preadv(r2, &(0x7f0000000140)=[{&(0x7f0000001400)=""/204, 0xcc}], 0x1, 0x2) 22:01:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000b80)="736d61707300ab6279c29eedfa3307ec8d816e2306503c7ec653287bbaa0b187d0e0e27cf4261b2f9cbba44fec48e5f22f9c754167fb18400b90c339ab78aa4a9d1beb90fcff38035c17ad060c97816147d6") ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, 0x0, [{r0}]}) 22:01:40 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000), 0x90) 22:01:40 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) 22:01:40 executing program 0: unshare(0x20400) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x7, 0x4) 22:01:40 executing program 1: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f2c442ad07fec9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b78f4978c309c4c3916efafedd7f") dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)=0x26a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000400)="003d07ff30084621ff3a3a66054a4b1eba409eea8ed6daf5fc476bda1c99d609f17d") seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000340)={0x0, 0x1, 0x6, @remote}, 0x10) init_module(&(0x7f0000000040)='\x00', 0x1, &(0x7f0000000180)="6367726f7570c47d00") close(0xffffffffffffffff) eventfd(0x0) getpgid(0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000080)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175e55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:40 executing program 4: getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xfffffffffffffffa) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:40 executing program 2: prctl$intptr(0x21, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:01:40 executing program 0: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") chmod(&(0x7f0000000080)='./file0\x00', 0x0) 22:01:41 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) unlink(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000880)='./file0\x00', &(0x7f0000000140)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgroups(0x0, &(0x7f00000003c0)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000540)) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getgid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgroups(0x0, &(0x7f0000000800)) setgroups(0x0, &(0x7f0000000840)) chmod(&(0x7f0000000940)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000001c0)) setxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.nlink\x00', &(0x7f0000000800)={'L+', 0x3ff}, 0x28, 0x0) stat(&(0x7f0000000840)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000280)="428055a06b6969ef69dc00d99069401737a6c13b3b44060f38211a40a564a741dfe0400f01efe5e54175457d0e2e1a1a01460f01ec31a3b786e2989f3f") 22:01:41 executing program 5: r0 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0xa, 0x80006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0x164, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000550000000000000081006e7230000000000000000000000000007465616d300000000000000000000000766c616e30000000000000000000000076657468305f746f5f7465616d000000aaaaaaaaaabb000000000000aaaaaaaaaabb0000000000000000a0000000a0000000d0000000636f6e6e6c6162656c0000000000000000000000000000000000000000000000080000000000000000003002000000004e46515545554500000000000000ecffffffffffffff000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff010000000b000000"]}, 0x1b4) 22:01:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000002c0), 0xfefe) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) sendfile(r0, r1, &(0x7f0000000100), 0x20000000009) 22:01:41 executing program 1: keyctl$set_reqkey_keyring(0xa, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001080)={0x0, @empty, @broadcast}, &(0x7f0000001100)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0xfffffffffffffe58, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f00000000c0)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000200)=0xffffffffffffff4d) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in6=@ipv4}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@rand_addr, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r0, r2, 0x0) 22:01:41 executing program 0: clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000200)) futex(&(0x7f0000000340), 0x0, 0x0, &(0x7f0000000380)={0x77359400}, &(0x7f0000000480), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:01:41 executing program 5: r0 = socket(0x1e, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) bind(r0, &(0x7f0000000040)=@generic={0x1e, "02fd000000000000000000000000fc00000005a121b80c00000000800000002e0a53b232394a0000000100000000ffff0f82e52b0a669ae43a620170a00021f069ca021f6f65dc1161e7068f358c00f9ecff1458d1ea03000030ffff000000090003b9c8ead200c577aeb81c90541d6d7c770ee590c8bcf70dc151eb1849"}, 0x80) 22:01:41 executing program 4: dup(0xffffffffffffff9c) preadv(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) prctl$void(0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) sendto$packet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:41 executing program 2: epoll_create(0x5) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/225, &(0x7f00000005c0)=0xe1) inotify_rm_watch(0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000003c0)='./file0/file0/file0\x00', &(0x7f00000006c0)='trusted.overlay.upper\x00', &(0x7f0000000900)={0x0, 0xfb, 0x15, 0x0, 0x0, "65cefbbab0952434272ce5a3068d1147"}, 0x15, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001940)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000001980)) socket$unix(0x1, 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0xb9, 0x0) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000700)) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") timerfd_create(0x0, 0x0) 22:01:41 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) stat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f00000006c0)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000002c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000300)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) accept4$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14, 0x0) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0), 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) arch_prctl(0x0, &(0x7f0000000200)) preadv(0xffffffffffffffff, &(0x7f0000001340), 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) 22:01:42 executing program 0: syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:42 executing program 1: setrlimit(0x7, &(0x7f0000000240)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:42 executing program 4: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'bridge0\x00', @ifru_addrs=@xdp}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000006040)) recvmmsg(0xffffffffffffff9c, &(0x7f0000005e00), 0x0, 0x0, &(0x7f0000006080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000060c0)={{{@in6=@dev, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000061c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000062c0)={0x0, @dev, @multicast2}, &(0x7f0000006300)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006440)=0x14, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000006480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000064c0)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006500)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000006600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006640)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}}}, &(0x7f0000006740)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006840)={@ipv4={[], [], @multicast1}}, &(0x7f0000006880)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006900)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006a00)={0x0, @multicast2, @remote}, &(0x7f0000006a40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000006b40)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000006fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007000)=0x14) accept4(0xffffffffffffff9c, &(0x7f0000007040)=@hci, &(0x7f00000070c0)=0x80, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000007100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007140)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000007280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000072c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000007300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007340)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000007380)={{{@in6=@mcast1, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000007480)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000074c0)={0x0, @local, @multicast1}, &(0x7f0000007500)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000075c0), &(0x7f0000007600)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007640)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000007740)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000007840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007880)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000078c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000079c0)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000007a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007a40)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) syz_execute_func(&(0x7f0000000000)="428055a0410fef69dcff0f1837370f38211ac4c4627d1338410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 22:01:42 executing program 1: unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") 22:01:43 executing program 3: setrlimit(0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") getresuid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") 22:01:43 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x0) prctl$setmm(0x18, 0x0, &(0x7f0000ff6000/0x9000)=nil) 22:01:43 executing program 2: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000280)="eb", 0x1, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r0, r0}, &(0x7f0000000080)=""/61, 0xfffffcf1, 0x0) 22:01:43 executing program 4: getpriority(0x10, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) memfd_create(&(0x7f00000002c0)="68d903dad7726c", 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000340)) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000140)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000200)={"7465616d5f736c6176e55f3100", @ifru_hwaddr=@dev}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:01:43 executing program 2: unshare(0x40400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 22:01:43 executing program 5: eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], &(0x7f0000000580)=""/178, 0xb2) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_emit_ethernet(0x0, &(0x7f0000007240)=ANY=[], &(0x7f0000000440)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000580)='./file1\x00'}, 0xfffffffffffffe25) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000380)) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000540)=0xc) stat(&(0x7f0000001980)='./file1\x00', &(0x7f00000019c0)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001a40)='./file1\x00', &(0x7f0000001a80)) getgroups(0x0, &(0x7f0000001b00)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getgroups(0x0, &(0x7f0000001b40)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000040c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004140), &(0x7f0000004180)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006b40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006b80), &(0x7f0000006bc0)=0xc) getgroups(0x0, &(0x7f0000006c00)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000006c40)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') read(r0, &(0x7f0000000400)=""/4096, 0x1000) 22:01:43 executing program 2: times(&(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000680), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) setrlimit(0x0, &(0x7f0000000200)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000d00)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) connect(0xffffffffffffffff, &(0x7f0000000540)=@ax25={0x3, {"8b8a0f0f010572"}}, 0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/144, 0x90, 0x0, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000600)) setregid(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 22:01:43 executing program 0: prctl$setname(0xf, &(0x7f0000000340)='nodevvboxnet1\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() read(0xffffffffffffffff, &(0x7f0000000380)=""/129, 0x81) sched_setscheduler(0x0, 0x0, &(0x7f0000000b00)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x224c, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f0000000000)=""/195}, 0x48) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@mcast2, @in=@remote}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000200)) memfd_create(&(0x7f0000000840)='em0\x00', 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000900)=@req={0x28, &(0x7f00000008c0)={'bridge_slave_0\x00', @ifru_data=&(0x7f0000000880)="f0b2cb20170251818f9b8ce0abf0ee23ec59dda8fa3a9d9b46b8790a142237a5"}}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 22:01:43 executing program 1: syz_extract_tcp_res$synack(&(0x7f00000003c0), 0x1, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000240)=0xc) gettid() getpgid(0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@l2, &(0x7f0000000140)=0x80) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) [ 299.557178] tmpfs: No value for mount option 'hÙÚ×rl' 22:01:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, {0x2, 0x0, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gre0\x00'}) 22:01:44 executing program 2: seccomp(0xfffffffffffffffc, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) clock_adjtime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:44 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000017000)=0xfffff7fffffffffd, 0x4) bind$inet(r1, &(0x7f0000011ff0)={0x2, 0x0, @broadcast}, 0x10) listen(r1, 0x0) 22:01:44 executing program 0: keyctl$dh_compute(0x9, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x332, &(0x7f0000000280)={&(0x7f0000a3dffa)={'crc32c-intel\x00'}}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socket$inet(0x2, 0xa, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080), 0xc) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:01:44 executing program 1: rt_sigsuspend(&(0x7f0000000340), 0xffffffffffffff20) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000200)='md5sumvmnet0\x00'}, 0x30) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:44 executing program 4: unshare(0x40400) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) syncfs(r0) 22:01:44 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") 22:01:44 executing program 5: clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f00000002c0)={'TPROXY\x00'}, &(0x7f0000000300)=0x1e) clock_gettime(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:44 executing program 4: mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 22:01:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1c5}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') socket$unix(0x1, 0x0, 0x0) clock_settime(0x0, &(0x7f0000000280)={0x77359400}) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:01:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xfffffffffffffffa) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$get_keyring_id(0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) gettid() getpgrp(0x0) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:45 executing program 0: setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) getuid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000006c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000740)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @rand_addr}, 0x10) clock_getres(0x0, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) rt_sigreturn() 22:01:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140), &(0x7f0000000180)=0x4) 22:01:45 executing program 5: clock_gettime(0x0, &(0x7f00000000c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000140)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000200)) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@ipv4={[], [], @local}}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:01:46 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x82, 0xffffffffffffffff, 0x38e) 22:01:46 executing program 0: listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000500)=""/248, 0xf8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:01:46 executing program 4: clock_gettime(0xfffffffffffffffe, &(0x7f0000000800)) clock_settime(0x0, &(0x7f00000002c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x1ae, &(0x7f0000000c80), 0x0, &(0x7f0000000c00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0x323) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000400), 0xc, &(0x7f0000001840)={&(0x7f0000002600)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000440)}) 22:01:46 executing program 2: mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @multicast2}, 0xc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) geteuid() fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f00000000c0)}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) memfd_create(&(0x7f0000000080)='*trustedproc\x00', 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)={'#! ', './file0'}, 0xb) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) pwrite64(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000380)=0xc) prctl$seccomp(0x16, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) setfsuid(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000480), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340), 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpid() fstat(0xffffffffffffffff, &(0x7f0000000240)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:46 executing program 1: r0 = socket$inet6(0xa, 0x100000002, 0x0) r1 = socket$packet(0x11, 0x4000000000000003, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000300), 0xfd90, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x11, &(0x7f0000000280)=0xc2, 0x4) sendto$inet6(r0, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) 22:01:46 executing program 5: unshare(0x20400) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r0, 0x5450) 22:01:46 executing program 1: unshare(0x0) getpid() openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000013c0)={0x0, @multicast2, @dev}, &(0x7f0000001400)=0xc) recvmsg(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000001480)=@hci, 0x80, &(0x7f0000001600), 0x0, &(0x7f0000001640)=""/88, 0x58}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001740)=0x14, 0x0) clock_gettime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) syz_execute_func(&(0x7f0000000500)="428055a0876969effb69dcfdd9d94e8f044ab9003c80203c80207fb432322333331837370f38211ac4c19086d9f28fc965670f19c54e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f07b80802403cec4c229f7014b") 22:01:46 executing program 5: setgroups(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) getuid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000003c0)) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0x0) keyctl$revoke(0x3, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000680)=@security={'security\x00', 0xe, 0x4, 0x338, 0x0, 0x3b0, 0x3b0, 0x0, 0x3b0, 0x4ac, 0x4ac, 0x4ac, 0x4ac, 0x4ac, 0x4, &(0x7f0000000240), {[{{@uncond, 0x0, 0x98, 0xf4}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@uncond, 0x0, 0x98, 0xf4}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@rand_addr, @empty, 0x0, 0x0, 'bridge_slave_1\x00', 'gre0\x00'}, 0x0, 0x98, 0xbc}, @common=@unspec=@STANDARD={0x24}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x394) 22:01:46 executing program 5: pipe2(&(0x7f0000000040), 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000180)={'bridge0\x00', @ifru_map}) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 22:01:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x00', 0x1}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'nr0\x00', @link_local}) 22:01:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000001240), 0x0) 22:01:47 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) getuid() write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000001980)=""/16, &(0x7f00000019c0)=0x10) getpid() ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000005c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00'}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000040)) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/94, 0x5e, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) add_key(&(0x7f0000000780)='id_legacy\x00', &(0x7f00000007c0), &(0x7f0000000800), 0x0, 0xfffffffffffffffa) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000640), 0x4) add_key(&(0x7f0000001800)='encrypted\x00', &(0x7f0000001840), &(0x7f0000001880), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) request_key(&(0x7f00000004c0)='asymmetric\x00', &(0x7f0000000500), &(0x7f0000000540)='\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:01:47 executing program 4: mknod(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getgroups(0x2, &(0x7f0000000480)=[0x0, 0xee00]) mount$fuse(0x0, &(0x7f0000001a80)='./file0\x00', &(0x7f0000001ac0)='fuse\x00', 0x0, &(0x7f0000001b00)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r0}}) 22:01:47 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000280), &(0x7f0000001340)="ff", 0x1, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 22:01:47 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d5c6070") r1 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 22:01:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) readlinkat(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)=""/29, 0x1d) 22:01:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1, 0x10, 0x5, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={0xffffffffffffffff, &(0x7f0000000000)="86", &(0x7f0000000540)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000200)={r0, &(0x7f0000000000), &(0x7f0000000140)=""/144}, 0x18) 22:01:47 executing program 1: ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@loopback, @local, @loopback}) memfd_create(&(0x7f0000000000)='\x00', 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f00000003c0)={'team_slave_1\x00', {0x2, 0x0, @remote}}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={@local}) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000340)={0x60}, 0x60) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) syz_execute_func(&(0x7f0000000400)="42805da0cd0fef69dc0f01eec4617d293973fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6bbf8ddae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fe2bb9500000000") 22:01:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) r2 = socket$packet(0x11, 0x808000000002, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f000095bffc), 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x7) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000300)=0x32, 0x4) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x482, 0x0, 0x0, 0x4e) 22:01:47 executing program 0: add_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0), &(0x7f0000000400)="a2b28bd1924581e08468835aa2abebb4a8e476784d115e5602160cf2bdbe80f2601a85895994eb2e8bb45358c7c4fd57f458aa51454642eff555547b24ff5c984d7a671d8d7a571c90c3b8ad381722973e6ec965e579edcea409b719d64cbee0440bfa8c677e00f2c170bd7b6e6f16895f50e002b6f3f074771368e09da3bd86d763f0959f425b472533f9340dd4064569b4a27780a62aabff08c18a9275e7ec5bbe15fe56a0ea9bdc39d50baef7ce7e055d885a1617caff9fcbfd03ad4b0f566809d0a4ea5ec56319bf6b7790763d144956cd4b0ba1c36809ddf37506c92430c96e1f9d45c135c760aaf8fac2aab5a8f56a857e574ff3ca840280554f493bdf41393704ed185a4b5174e00d6a44abb78b54e8c6f9393ceb5100a93b4377db7c32db11803f84682cbc049604fce9ce308d861cb7b7188c8107fb85111cce8610fabf60fd96c4b3f719d155b9e40e189731d6df1b2598b2364d656d96a894ebbd05ad0c53d919b3c0d0ba942cea387502bba26013d4e3d1e4f026d0cdc3f1a86723b3ee5080fa2dafd651be5861c69b5ace9527e49b58415073c6dd6a3a5265b5fef3083c4265618b4bd37893f51364d89463e5b5d85aef8858a5533384dba35922364e536f91ed0939145d36ab868cbcec9f0a9e535c85675e9dc81fddb9b4ff762464c0a6b50101dca647515203fa68bd407ffbb4ee35d513a07bcd833d4a4b6d3ce51617ef0e58b9960ad6c757337bb816ba1271a8b0fab1476303a2124dcbeaff010246f91a86376ede7f9ef36ebd65ce60d7d1752d42842ee089fcfad811448a1b4c8057e763e1202fe6a0e8e2d12cc975a6f9c45598f97fdffadeeaabba4abda87261a779379fd1c01041944893a17c2659653770b6d6ddad52ea6b2ad61c402cbaa8c0115c99437e9892c0499cbfcd043497c2ea22042acde258be5ee8d435b2b45ef275d2132b7315825deaa324c859edb63034059403ec4ee0b3f4a8e38eef4d34d84db1f91620c1a39a6502aa023904466005651ca2f4fad9690d641fdc35aae1aea3ab9a57d1d5f4e3ff1db4199ce567d161000a9e30dac639f05626d33ed59b9e89120fe8ac2ac451bc4fa8f597fb2ee1eeae24b799b821d7ae9b", 0x320, 0xfffffffffffffffe) 22:01:47 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1400cb"], 0x1}}, 0x0) write$evdev(r0, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) 22:01:47 executing program 2: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@remote, @in=@remote}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00'}) clock_gettime(0x0, &(0x7f0000000400)) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000040)) pipe(&(0x7f0000000180)) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) 22:01:47 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) getrusage(0x0, &(0x7f0000000a00)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 22:01:49 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)}, 0xc100) write$binfmt_aout(r1, &(0x7f0000000b00)=ANY=[@ANYBLOB="0000000000000000ff00001d01ffffffffffffff00dfffffffffffffff000000"], 0x20) 22:01:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000240)=0x6, 0x4) 22:01:49 executing program 1: getrandom(&(0x7f0000000400)=""/148, 0x94, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) gettid() ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0x8) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/70, &(0x7f0000000300)=0x46) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) gettid() syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:49 executing program 5: prctl$void(0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f0000000640)) eventfd2(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000009c0)) setfsgid(0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000007c0)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000800), &(0x7f0000000840)=0x14) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip6gre0\x00'}) setresuid(0x0, 0x0, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000700)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000580)) write$P9_ROPEN(0xffffffffffffffff, &(0x7f00000002c0)={0x83139a82865b1543}, 0xffffff0a) lsetxattr(&(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)=@known='security.SMACK64TRANSMUTE\x00', &(0x7f00000006c0)=',\x00', 0x2, 0x0) 22:01:49 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = getpid() ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000031c0)={'team0\x00'}) sendmmsg(0xffffffffffffffff, &(0x7f0000007f40)=[{{&(0x7f0000005940)=@rc, 0x80, &(0x7f0000005b40), 0x0, &(0x7f0000005b80)}}], 0x1, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000040)) creat(&(0x7f0000000240)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) 22:01:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)) 22:01:49 executing program 2: r0 = socket(0x15, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000380)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) 22:01:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x800, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000040)}]) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) io_getevents(r1, 0x0, 0x1000000, &(0x7f0000000040), &(0x7f0000000080)={0x77359400}) [ 304.534854] audit: type=1400 audit(1537308109.297:53): avc: denied { setopt } for pid=18164 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 22:01:49 executing program 2: mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getgid() dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f0000000600)=@file={0x0, './file0\x00'}, 0x6e) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000680)={0x10}, 0x10) lsetxattr$system_posix_acl(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000000580), 0x24, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000180)={'mangle\x00', 0x2, [{}, {}]}, 0x48) getuid() syz_execute_func(&(0x7f0000000200)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a922c010164ac1e5d31a3b786e29845d9fe7f") 22:01:49 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x805, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="c6", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x1}, 0x1c) 22:01:49 executing program 0: clock_gettime(0xd9012b20d797d5a0, &(0x7f0000000300)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) pipe(&(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@multicast2, @in6}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000440)={0x0, 'teql0\x00'}, 0x18) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{0x77359400}}, &(0x7f0000000680)) open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000002c0)={'NETMAP\x00'}, &(0x7f00000003c0)=0x1e) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)=""/137, &(0x7f0000000700)=0xfffffffffffffe03) 22:01:49 executing program 4: clock_gettime(0x1, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 22:01:49 executing program 3: getitimer(0x2, &(0x7f00000000c0)) pipe2(&(0x7f0000000140), 0x0) sched_yield() setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000780), 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000500)=""/62) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@generic) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da0be0fef69dc0f01eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f06ebab204000000cac441795b64ae01dae5f3460f58f975450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6, @in6}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000f40)=0xe8) getgroups(0x0, &(0x7f0000000f80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000fc0)) stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) getgroups(0x0, &(0x7f00000025c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getpgrp(0x0) geteuid() getgroups(0x0, &(0x7f0000002840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000028c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000002880)='rose0\x00'}, 0x30) getresuid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getgroups(0x0, &(0x7f00000029c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f00000041c0)) getgroups(0x0, &(0x7f0000004240)) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f0000004280)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004500)={{{@in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004600)=0xe8) getegid() getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000004640)) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000047c0)={{{@in6=@remote, @in=@dev}}, {{@in=@loopback}}}, &(0x7f00000048c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004900)) 22:01:50 executing program 1: r0 = socket$inet(0x2, 0x3, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) sendto$inet(r0, &(0x7f0000000000), 0xfec4, 0x0, &(0x7f0000001000)={0x2, 0x0, @broadcast}, 0x10) 22:01:50 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 22:01:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@dev, @in6=@dev}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x3}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, 0xe8) 22:01:50 executing program 1: getresuid(&(0x7f0000000040), &(0x7f00000007c0), &(0x7f0000000200)) request_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000800)='ppp0eth0lovmnet0-vboxnet0\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000a40)='keyring\x00', &(0x7f0000000a80), 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000ac0)='encrypted\x00', &(0x7f0000000740), &(0x7f00000007c0), 0x3ce, 0x0) request_key(&(0x7f00000008c0)='ceph\x00', &(0x7f0000000940), &(0x7f0000000a00)='md5sum\'}selfem1\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000580), 0xc) keyctl$get_persistent(0x16, 0x0, 0x0) getrandom(&(0x7f0000000280)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) memfd_create(&(0x7f0000000380)='md5sum\'}selfem1\x00', 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000340)) listen(0xffffffffffffffff, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) read(0xffffffffffffffff, &(0x7f0000000180), 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000005c0)={'bond0\x00'}) setitimer(0x0, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, &(0x7f0000000400)) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000b00)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000780)='\x00'}, 0x30) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) syz_execute_func(&(0x7f0000000980)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302fc4e3410218f9450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000900)) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f00000006c0)=""/48) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f0000000a40)=ANY=[]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000480)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680), 0x4) keyctl$get_persistent(0x16, 0x0, 0x0) 22:01:50 executing program 0: mmap(&(0x7f0000dcc000/0x1000)=nil, 0x1000, 0x0, 0x40034, 0xffffffffffffffff, 0x0) 22:01:50 executing program 2: utime(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900450f71e1003d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1e2989f567f") dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000700)={'bpq0\x00'}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000006c0)) rt_sigaction(0x0, &(0x7f0000000440)={&(0x7f00000002c0)="660fec47973e3ef36f26642e660fc5d41fc421bd626f44c4c1dc5f06c402a98e48cbc462c9b7252cc50000c4022d9aa96f000000670fd16df7c146d0f9", {}, 0x0, &(0x7f0000000540)="8f29f89150e7660fe62514000000c4a1fd7fd7c401acc2240603660f79e2c423056c8bfb2100000c0fd7f92e642666420ffede66470f3a614d00053e0fb58765566666"}, &(0x7f0000000640)={&(0x7f00000005c0)="c422bdb7e93ef30f1a1fc4227d5a44fb00c461ec1424eec4017858420965f3e0ff2e430f01eed9eb3e660fe718f00112", {}, 0x0, &(0x7f0000000600)="66420fe96e00660f38254af6c482e9986f276745dec0c441bddf00c4e1205cbd386e21c0c4c1ffe616d9e5c481fa6f950a0000000fe35b04"}, 0x8, &(0x7f0000000680)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000740)) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000080), 0x4) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) memfd_create(&(0x7f0000000200)=',\x00', 0x0) 22:01:50 executing program 0: pipe(&(0x7f0000000040)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 22:01:50 executing program 4: epoll_create1(0x0) getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:01:51 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) r1 = socket$inet6(0xa, 0x806, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0), 0x6) 22:01:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa39610f0f211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b771fb26f00fbb9500000000") getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000180)) 22:01:51 executing program 4: unshare(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) dup(0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000480)={'sit0\x00', &(0x7f0000000540)=ANY=[]}) syz_open_procfs(0x0, &(0x7f0000002b80)="73636865640033263d0d65c8473f5b945b2851e9e80000008e960301dfe3c971cb459a53874a638680803ca7000000") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@rand_addr}}, &(0x7f0000000980)=0xe8) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@remote, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000b80)=0xe8) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000bc0)={{{@in6=@remote, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000cc0)=0xe8) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000002440)) lstat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000002500)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in=@multicast1}}, &(0x7f0000002700)=0xe8) stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002800)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000002900)=0xe8) lstat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002ac0), 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xc3) add_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000440)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x1ef) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500), 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, 0x0, 0x0, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) keyctl$read(0xb, 0x0, &(0x7f0000000080)=""/50, 0x32) keyctl$unlink(0x9, 0x0, 0x0) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") 22:01:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") sendmsg$nl_xfrm(r0, &(0x7f0000000840)={&(0x7f0000000140), 0xc, &(0x7f0000000800)={&(0x7f0000000440)=@updpolicy={0xfc, 0x19, 0x105, 0x0, 0x0, {{@in=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x44, 0x5, [{{@in=@remote, 0x0, 0x6c}, 0x0, @in=@remote}]}]}, 0xfc}}, 0x0) 22:01:51 executing program 0: r0 = memfd_create(&(0x7f0000000280)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000000)=0x369) 22:01:51 executing program 1: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:01:52 executing program 5: clock_gettime(0x0, &(0x7f00000006c0)) clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000040)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='$system\x00'}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000140), 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) gettid() ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000580)={'veth1_to_team\x00', &(0x7f00000008c0)=ANY=[]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@remote}, &(0x7f0000000540)=0x14) close(0xffffffffffffffff) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000300)=""/221) socket$netlink(0x10, 0x3, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000b00)=""/171) syz_execute_func(&(0x7f0000000740)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 22:01:52 executing program 0: socket$unix(0x1, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000800)) clock_settime(0x0, &(0x7f00000002c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x1ae, &(0x7f0000000c80), 0x0, &(0x7f0000000c00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0x323) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000400), 0xc, &(0x7f0000001840)={&(0x7f0000002600)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000380)}) syz_genetlink_get_family_id$team(&(0x7f0000000940)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000600)=0x139) clock_gettime(0x0, &(0x7f0000000680)) finit_module(0xffffffffffffffff, &(0x7f0000000080)='lo.em1eth0trusted$\x00', 0x0) 22:01:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000939000)=0x40000001b) dup3(r1, r0, 0x0) 22:01:52 executing program 2: clock_settime(0x0, &(0x7f0000000600)) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000940)=0x10) clock_gettime(0x0, &(0x7f0000000200)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000001800)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000001840), 0x4) ustat(0x0, &(0x7f0000000400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)) getpgid(0x0) rt_sigtimedwait(&(0x7f0000000480), 0x0, &(0x7f0000000500)={0x0, 0x1c9c380}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280), 0x0) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000440)='cgroup.type\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000000300)=@hci, &(0x7f00000003c0)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000700)={0x0, @rand_addr, @loopback}, &(0x7f0000000740)=0xfffffffffffffe39) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001740)={@empty, @loopback}, &(0x7f0000001780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000005b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005b40)=0x14) 22:01:52 executing program 4: times(&(0x7f0000000040)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000180), &(0x7f0000000680), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) setrlimit(0x0, &(0x7f0000000200)) io_getevents(0x0, 0x0, 0x0, &(0x7f0000000c80), &(0x7f0000000d00)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000ac0)=0x14) connect(0xffffffffffffffff, &(0x7f0000000540)=@ax25={0x3, {"8b8a0f0f010572"}}, 0x80) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/144, 0x90, 0x0, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000600)) setregid(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@mcast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000002c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) syz_genetlink_get_family_id$team(&(0x7f00000009c0)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@remote}, &(0x7f00000005c0)=0xc) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005200)={'bridge_slave_0\x00'}) 22:01:52 executing program 1: r0 = memfd_create(&(0x7f0000000000)='b\n\x00\x00\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x4d011, r0, 0x0) 22:01:52 executing program 1: clock_gettime(0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f00000001c0)) getgid() clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0xffffffffffffffff) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000380)) getsockname$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @remote}, &(0x7f0000000240)=0x10) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280), 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000500)={0x0, @rand_addr, 0x0, 0x0, 'nq\x00'}, 0x2c) readahead(0xffffffffffffffff, 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 22:01:52 executing program 3: getitimer(0x2, &(0x7f00000000c0)) pipe2(&(0x7f0000000140), 0x0) sched_yield() setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000780), 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000500)=""/62) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@generic) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) nanosleep(&(0x7f0000000040), 0x0) eventfd(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', '\x00'}, &(0x7f0000000140)=""/19, 0x13) dup(0xffffffffffffffff) accept4$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a80)=0x14, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000004c0)=""/139, 0x8b, 0x0, &(0x7f0000001ac0), 0x14) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000580)) getegid() ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000400)=0xc) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000040)) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000100), &(0x7f0000000180), 0x0, 0xfffffffffffffff8) request_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000200), &(0x7f0000000240)='9p\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000400), 0x0, 0xfffffffffffffffc) 22:01:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 22:01:53 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f0000000240)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) select(0x40, &(0x7f00000000c0), &(0x7f0000000200)={0x7}, &(0x7f0000000280), &(0x7f00000002c0)={0x77359400}) clock_gettime(0x0, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x50, &(0x7f0000000600)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)='rxrpc_s\x00'}, 0x30) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000180)=""/34) getresgid(&(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000140)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0/file0\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) sched_getattr(0x0, &(0x7f0000000300), 0x30, 0x0) getgroups(0x0, &(0x7f0000000600)) socket$nl_netfilter(0x10, 0x3, 0xc) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000500)={0x18}, 0x18) sendmmsg(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) stat(&(0x7f0000001840)='./file0/file0\x00', &(0x7f00000017c0)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000340), 0x4) 22:01:53 executing program 2: unshare(0x200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100000, &(0x7f0000000400)) setns(r0, 0x0) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)="760001b076", 0x3080, &(0x7f0000000200)) mount(&(0x7f0000000100)=@nullb='/dev/nullb0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000440)='eth1{\x00') mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='vfat\x00', 0x2801080, 0x0) 22:01:53 executing program 0: stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)) pipe2(&(0x7f0000000280), 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000540)) connect$netlink(0xffffffffffffffff, &(0x7f0000000440)=@proc, 0xc) add_key(&(0x7f0000000400)='id_resolver\x00', &(0x7f0000000040), &(0x7f00000004c0), 0x0, 0xfffffffffffffffb) keyctl$join(0x1, 0x0) seccomp(0x20000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000240)) sched_getscheduler(0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}, 0x10) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000004c0), 0x4) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @broadcast}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @dev}, 'ip_vti0\x00'}) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000300)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000200)}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000500)) ioprio_set$uid(0x0, 0x0, 0x0) open(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000001c0)}) 22:01:53 executing program 2: prctl$void(0x35) 22:01:53 executing program 5: futex(&(0x7f0000000040), 0x800, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) socket$packet(0x11, 0x0, 0x300) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000440)={0x0, @dev, @dev}, &(0x7f0000000480)=0xc) bind$packet(0xffffffffffffffff, &(0x7f0000000600), 0x14) clock_gettime(0x0, &(0x7f0000001100)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001600)=ANY=[], 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) prctl$setname(0xf, &(0x7f0000000640)='}userloem0!,\x00') fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) fstat(0xffffffffffffffff, &(0x7f00000002c0)) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000440)) getgroups(0x0, &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) getgid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getegid() getgroups(0x0, &(0x7f0000000600)) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:53 executing program 2: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@multicast1, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000e40)={0x10}, 0x10) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) syz_execute_func(&(0x7f0000000ac0)="af8055a0596969ef69dc00d947f6d466410f60bad33f00007c2ac462193e7007afaf40f75e00437373a7c4a2f930b80e70714b660fc42608efc58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e698c402492c31") 22:01:53 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x3, 0x1) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000100)={0x9, {{0x2, 0x0, @multicast1}}}, 0x88) 22:01:53 executing program 5: keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000016c0), 0x2e8, 0x0) 22:01:53 executing program 1: epoll_create(0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bond0\x00') 22:01:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f00004e8000), 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) close(r1) close(r0) 22:01:54 executing program 5: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0xc8, &(0x7f0000000200), 0x4) setsockopt$inet_int(r0, 0x0, 0x50000000000cb, &(0x7f00000000c0), 0x341) 22:01:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={&(0x7f0000000100), 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 22:01:54 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:01:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f0000000000)="ac0000", 0x4) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) 22:01:54 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f00000001c0), 0x0, 0x4, &(0x7f0000000100), &(0x7f00000000c0), 0x0) 22:01:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000015c0)={'sit0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000000a000)={&(0x7f0000000080), 0xc, &(0x7f0000000000)={&(0x7f00000002c0)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x10, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}]}, 0xfe71}}, 0x0) 22:01:54 executing program 5: clock_gettime(0x0, &(0x7f0000000800)) clock_settime(0x0, &(0x7f00000002c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x1ae, &(0x7f0000000c80), 0x0, &(0x7f0000000c00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0x323) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000011c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000400), 0xc, &(0x7f0000001840)={&(0x7f0000002600)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000600)=0x139) clock_gettime(0x0, &(0x7f0000000680)) 22:01:54 executing program 2: removexattr(&(0x7f0000000400)='./file0/../file0\x00', &(0x7f0000000400)=ANY=[]) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) epoll_create1(0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rmdir(&(0x7f00000001c0)='./file0\x00') getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x4) memfd_create(&(0x7f0000000040)='\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:54 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) unshare(0x20400) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000080)={0x0, @loopback, 0x0, 0x0, 'fo\x00'}, 0x2c) 22:01:54 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000440), &(0x7f0000000480)=0x4) 22:01:55 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000280)=""/14, 0xe) [ 310.419527] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 22:01:55 executing program 3: memfd_create(&(0x7f0000000300)="675c2b7d6070703f0040de27ec5509e22d30bc4fb42769e62a56771c7f2636d236be1716b2d23f5068ba9bbfde535c162859a19275d2e84a050c6f3424efb51c9fe3d3bbd8e1a64d4eb936d722c4388c7372ad0bcbd48baf023f1ffe1def30c1c31b692c9279258686d44f6d569cb6e56895d7d88d790408ed221d8cfc7f87a6cd82d697", 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000700)=""/227, 0xe3}, 0x0) eventfd(0x0) dup(0xffffffffffffffff) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0945340028523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:01:55 executing program 4: syz_emit_ethernet(0x82, &(0x7f0000000340)={@remote, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "ae575a", 0x4c, 0x0, 0x0, @mcast2, @mcast1, {[@fragment={0x2f}], @gre}}}}}, &(0x7f0000000080)) 22:01:55 executing program 1: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioperm(0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000340)='syz0\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[]}}, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000280)=']\\]security*systemtrusted@\x00', 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:55 executing program 0: request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000140), &(0x7f0000000180)='-mime_typevmnet0+#*keyring\x00', 0x0) 22:01:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_newrule={0x20, 0x20, 0x201}, 0x20}}, 0x0) 22:01:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0) [ 311.051357] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 22:01:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="c4c2fd1d4500d0c467f247a5662e4380820c3600000004b8c483754af52ec463250ffd00c4c37d78a28e899999adc4e1045948b3f2d9e5") 22:01:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x48, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000140)=0x10) 22:01:55 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="7f000046006b"], 0x6) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x60, &(0x7f00000001c0)={0x0, 'bridge_slave_0\x00'}, 0x18) 22:01:55 executing program 4: getpid() ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000040)) getrandom(&(0x7f0000000200)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) personality(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000340)}) pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) timer_getoverrun(0x0) keyctl$join(0x1, &(0x7f0000000140)) clock_getres(0x0, &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") [ 311.141163] netlink: 4 bytes leftover after parsing attributes in process `syz-executor5'. 22:01:55 executing program 5: epoll_create1(0x0) socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)) preadv(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000740), 0x0, &(0x7f0000002a80)=ANY=[]}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302f400fc77a20450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f000000d379)={&(0x7f0000000140)={0xec4, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="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"]}, 0xec4}}, 0x0) 22:01:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000d00)=@polexpire={0xc0, 0x1b, 0x229, 0x0, 0x0, {{{@in=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80}}}}, 0xfc31}}, 0x0) 22:01:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x2, 0x28021) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000040)=[{{}, 0x1, 0x80000062, 0x2}, {}], 0x30) 22:01:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10, 0x7a00000000000000}, 0xc, &(0x7f0000023ff0)={&(0x7f00000000c0)={0x18, 0x27, 0xaff, 0x0, 0x0, {0x4}, [@nested={0x4, 0x1}]}, 0x18}}, 0x0) 22:01:56 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001840)) setgid(0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/4096, &(0x7f0000000080)=0x1000) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:01:56 executing program 4: unshare(0x20400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) fadvise64(r0, 0x0, 0x0, 0x0) 22:01:56 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000016fe0)={{0x5}, {0x0, 0x5f6c}}, &(0x7f000000ffe0)) 22:01:56 executing program 2: quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) memfd_create(&(0x7f00000003c0)='/dev/ptmx\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000640)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@multicast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000580)) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f00000008c0)={0x0, @speck128}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/uhid\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000340)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:01:56 executing program 5: prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") 22:01:57 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="d8"], 0x1}}], 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x5dd7d56b, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x5654807, 0x0) 22:01:57 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000080), 0x4) 22:01:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) getpgid(0xffffffffffffffff) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") 22:01:57 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) 22:01:57 executing program 3: getpid() r0 = memfd_create(&(0x7f0000001fc1)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) removexattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000001240)=ANY=[]) 22:01:57 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000001140)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000000c0)=[0x7]) 22:01:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000840)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x20, 0x10, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}}, 0x0) 22:01:57 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xfffffffffffffffc, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x4) 22:01:57 executing program 1: clock_gettime(0x4, &(0x7f0000000340)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000380)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000300)=ANY=[], 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) ppoll(&(0x7f0000000380), 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x8) clock_getres(0x0, &(0x7f0000000300)) waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000004c0)={0x0, @broadcast, 0x0, 0x0, 'lblc\x00'}, 0x2c) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000240)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)) 22:01:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa80000000000fffeffe809000000fff5dd0000001000010009040800410500000000fcff0000000000", 0x58}], 0x1) 22:01:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={"00ac720000000000ec973f820f7c4000", 0x201}) ioctl$TUNSETGROUP(r0, 0x800454df, 0x0) 22:01:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)="c48a3b3097433a5095b38f856af8010034c0f80000000000", 0x18, 0x0, 0x0, 0x0) 22:01:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='reno\x00', 0x5) 22:01:57 executing program 0: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000008c0)=0xffffffffffffffad) memfd_create(&(0x7f0000000040)='em0}lomime_type\x00', 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000900)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:01:57 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x6c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000002c0)) creat(&(0x7f0000000780)='./file0\x00', 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000007c0)) getpgrp(0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) geteuid() getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004fc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005000)={{{@in, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000005100)=0xe8) stat(&(0x7f0000005140)='./file1\x00', &(0x7f0000005180)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ac0), &(0x7f0000005b00)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005b80)={{{@in6=@local, @in=@broadcast}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000005c80)=0xe8) lstat(&(0x7f0000005cc0)='./file0\x00', &(0x7f0000005d00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008800)) fstat(0xffffffffffffffff, &(0x7f0000008840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 22:01:57 executing program 5: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) getsockopt(r0, 0x114, 0x8, &(0x7f0000000080)=""/13, &(0x7f0000000100)=0xd) 22:01:58 executing program 3: prctl$seccomp(0x21, 0x1, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 22:01:58 executing program 2: prctl$setname(0xf, &(0x7f0000000440)='\x00') openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000040), 0x4) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@local, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000c80)=0xe8) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000280), 0xc, &(0x7f0000000cc0)={&(0x7f0000000ec0)=ANY=[]}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000dc0)=""/31) recvmmsg(0xffffffffffffff9c, &(0x7f0000000b00), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/uinput\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f00000000c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1}, 0x1c) accept4(0xffffffffffffffff, &(0x7f0000000480)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getgroups(0x0, &(0x7f00000002c0)) getegid() stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgid() getgid() getgroups(0x0, &(0x7f0000004680)) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) getresgid(&(0x7f0000004780), &(0x7f00000047c0), &(0x7f0000004800)) getresgid(&(0x7f0000004840), &(0x7f0000004880), &(0x7f00000048c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005cc0), &(0x7f0000005d00)=0xc) lstat(&(0x7f0000005d40)='./file0\x00', &(0x7f0000005d80)) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:01:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x110}}, 0x0) 22:01:58 executing program 1: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5410f71e2006766f342cd570f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:01:58 executing program 4: getitimer(0x0, &(0x7f00000000c0)) pipe2(&(0x7f0000000140), 0x0) sched_yield() setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000780), 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000500)=""/62) clock_getres(0x0, &(0x7f00000001c0)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@generic) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da0be0fef69dc0f01eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f06ebab204000000cac441795b64ae01dae5f3460f58f975450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000cc0)={{{@in6, @in6}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000dc0)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e40)={{{@in6, @in=@remote}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000f40)=0xe8) getgroups(0x0, &(0x7f0000000f80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000fc0)) stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) getgroups(0x0, &(0x7f00000025c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002640)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000002740)=0xe8) stat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getpgrp(0x0) geteuid() getgroups(0x0, &(0x7f0000002840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000028c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000002880)='rose0\x00'}, 0x30) getresuid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getgroups(0x0, &(0x7f00000029c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004180)) fstat(0xffffffffffffffff, &(0x7f00000041c0)) getgroups(0x0, &(0x7f0000004240)) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f0000004280)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004500)={{{@in=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000004600)=0xe8) getegid() getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000004640)) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000047c0)={{{@in6=@remote, @in=@dev}}, {{@in=@loopback}}}, &(0x7f00000048c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004900)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005b40), 0x0, 0x0) 22:01:58 executing program 0: unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00'}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d00), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/94, 0x5e, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000400)={'syz_tun\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0, 0x95, &(0x7f0000000540), &(0x7f00000005c0)=""/149}, 0x28) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@mcast2}, &(0x7f0000000080)=0x14) llistxattr(&(0x7f0000000180)='.\x00', &(0x7f00000006c0)=""/224, 0xe0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000540)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) fstat(0xffffffffffffffff, &(0x7f00000018c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001dc0)='cgroup.procs\x00', 0x2, 0x0) gettid() geteuid() 22:01:59 executing program 5: setpriority(0x0, 0x0, 0x0) epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000180)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000080)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) getrandom(&(0x7f00000000c0)=""/148, 0x94, 0x0) memfd_create(&(0x7f0000001bc0)="77a5c5e9189cee79cd93a7df6d570c7647098b733d", 0x0) memfd_create(&(0x7f0000000400)='vlan0\x00', 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f00000011c0), &(0x7f0000001240)=0x6e) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000580)="42805da0ad5252ef84dc3df83df8eece67f3406e660c54823dc3c381768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f0000000200)) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioprio_get$pid(0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) memfd_create(&(0x7f0000000140)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4), 0x27) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0xffdc) personality(0x0) 22:01:59 executing program 4: r0 = memfd_create(&(0x7f0000000000)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000440)="0795040000000029a77ce74fb58ddf0000356317b447d1", 0x17) sendfile(r0, r0, &(0x7f0000001000), 0x10002) 22:01:59 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = socket(0x40000000011, 0x80002, 0x0) bind$packet(r1, &(0x7f00000000c0)={0x11, 0xf8, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x0, 0x9ffc}, 0x4) 22:01:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040), 0xf) 22:01:59 executing program 0: eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], &(0x7f0000000580)=""/178, 0xb2) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:01:59 executing program 2: getpid() waitid(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) inotify_init1(0x0) pipe(&(0x7f0000000240)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='io.stat\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x77359400}}, 0x0) socket$inet6(0xa, 0x0, 0xd969) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="42805da0bd0fef69dc0f01eece49fe19987c7cfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:02:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) 22:02:00 executing program 5: mmap(&(0x7f000090c000/0x4000)=nil, 0x7fffdf6f3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 22:02:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19}]}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) 22:02:00 executing program 4: unshare(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@loopback, @in6=@dev}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00'}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d00), 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/94, 0x5e, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000400)={'syz_tun\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000002cc0)=0xe8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0, 0x95, &(0x7f0000000540), &(0x7f00000005c0)=""/149}, 0x28) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@mcast2}, &(0x7f0000000080)=0x14) llistxattr(&(0x7f0000000180)='.\x00', &(0x7f00000006c0)=""/224, 0xe0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000540)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) fstat(0xffffffffffffffff, &(0x7f00000018c0)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001dc0)='cgroup.procs\x00', 0x2, 0x0) gettid() 22:02:00 executing program 5: futex(&(0x7f0000000180), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000400)) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd2(0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000003c0)={0x0, 0x1, 0x6, @local}, 0x10) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:02:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300094700bb61e1c3e4ffff06000000020000004500000020699e00190029000d0000000000280f00000007fd17e9ffff06060400", 0x39}], 0x1) 22:02:00 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x16}]}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 22:02:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x28, &(0x7f0000000180), 0x0) 22:02:00 executing program 1: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) fgetxattr(r0, &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000500)=""/218, 0xda) 22:02:00 executing program 1: timer_create(0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000340), &(0x7f0000000280)}}, &(0x7f0000000480)) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000740)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) rt_sigpending(&(0x7f0000000300), 0x8) timerfd_create(0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000004c0)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000380)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@rand_addr, @dev}, 0x8) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) prctl$void(0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000580)=ANY=[]) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000740)=ANY=[], &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000500)) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000540)={@dev}) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4110dd4ac1e5d31a3b744dbe271fb0703") 22:02:00 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x80000000000043, &(0x7f0000000240)="cfd23d3d", 0x4) 22:02:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='map_files\x00') getdents64(r1, &(0x7f0000000080)=""/63, 0x2f) getdents64(r1, &(0x7f00000000c0)=""/172, 0x7a) 22:02:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8911, &(0x7f0000000040)={'veth1\x00', @ifru_settings={0x0, 0x0, @te1}}) 22:02:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000140)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) dup2(r0, r1) 22:02:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x0, 0xffffffffffffff3f}) ioctl$TCSETS(r1, 0x40045431, &(0x7f00005befdc)) r2 = syz_open_pts(r1, 0x20201) write(r2, &(0x7f0000000800)="65cab0858cd9cdc0669d8f2ce6567650094401002d36b4944e96f123af1f92016c181ea9425be8c20f2a00000000000000005c07aced4b079b2d356763c8c800000000000000000000000000002ecd71caef6e47520aa311080e993c0e9d576d8b4df4cf20dcd9d3199e0d6c8f6113257b722f21f5ffdc8935bfd77b7994247484be48e29ee6a187cc56aafafbaa3dbfa20fa92442a8237ad7d3fce539f5a93f41208e0f8d1f07df1ca971ba7074fb6c23", 0xb1) 22:02:01 executing program 4: alarm(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000580), 0x10) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:02:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") syz_open_procfs(0x0, &(0x7f0000000440)='fd/4\x00') 22:02:01 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000840), 0x1, 0x0) prctl$setname(0xf, &(0x7f0000000180)='^proc)procbdev+(^eth0&wlan0nodevsecurity\'[!eth0\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(0xffffffffffffffff, &(0x7f00000007c0)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) getpid() 22:02:01 executing program 5: memfd_create(&(0x7f00000000c0)="736563757269748e00", 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000200)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000240)) 22:02:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000080)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x2d4}, 0x10) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000001fc0), 0xb}}], 0x4000000000003f0, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000008ac0)={&(0x7f0000006900), 0xc, &(0x7f0000006980)={&(0x7f0000008a40)={0x14}, 0x14}}, 0x0) 22:02:01 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x40082404, 0xffffffffffffffff) 22:02:01 executing program 1: lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x15, 0x0, 0x0, "89484da8b9c2f12405994a7f5f9882e0"}, 0x15, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:01 executing program 5: memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) pselect6(0x40, &(0x7f0000000040)={0x8}, &(0x7f0000000fc0), &(0x7f0000013fc0), &(0x7f0000000100), &(0x7f0000000ff0)={&(0x7f00000001c0), 0x8}) 22:02:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x80000000000031, &(0x7f0000000080), 0x0) 22:02:01 executing program 0: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") pipe2(&(0x7f0000000140), 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000440)) io_setup(0x0, &(0x7f0000000240)) io_submit(0x0, 0x0, &(0x7f0000000340)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'team0\x00'}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000480)={{0x2, 0x0, @loopback}, {0x0, @local}, 0x0, {0x2, 0x0, @remote}, 'veth0_to_bridge\x00'}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000340)) 22:02:01 executing program 3: sync() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000040)='id_resolver\x00', &(0x7f0000000080), &(0x7f00000000c0)='em0vboxnet0\\\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffd) keyctl$search(0xa, 0x0, &(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180), 0x0) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:01 executing program 2: write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000340)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:01 executing program 4: prctl$setname(0xf, &(0x7f0000000340)='nodevvboxnet1\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000a80), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) fstat(0xffffffffffffffff, &(0x7f0000000a00)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000440), 0xffffffffffffffff) getpid() read(0xffffffffffffffff, &(0x7f0000000380)=""/129, 0x81) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 22:02:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21}, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000005d40)={&(0x7f0000000000), 0xc, &(0x7f0000005d00)={&(0x7f00000055c0)={0x14}, 0x14}}, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000700)={0x0, 0x40000007fff, 0x80000001}, 0x14) shutdown(r0, 0x1) 22:02:01 executing program 1: getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000140)) close(0xffffffffffffffff) timerfd_create(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[]}}, 0x0) 22:02:02 executing program 5: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) iopl(0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x8) getuid() openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000380)={'icmp6\x00'}, &(0x7f00000003c0)=0x1e) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0aa878769ef9e69dcdcd9868441ff0f1837373add0e03c19086fbd9f28f8f23b17ac7f2c4217c291ac4a1ab58f5c4c21d9e1f64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 22:02:02 executing program 0: sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x48, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8}]}]}, 0x48}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00003cefe4)={&(0x7f0000000300)={0x10, 0x36200}, 0xc, &(0x7f0000007ff0)={&(0x7f0000000180)={0xffce, 0x2e, 0x6fd, 0x0, 0x0, {0x2004}, [@nested={0xc, 0x0, [@typed={0x62, 0x0, @ipv4}]}]}, 0xffce}}, 0x0) 22:02:02 executing program 2: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000840), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/loop-control\x00', 0x0, 0x0) memfd_create(&(0x7f0000000a40)='\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000026c0)='system.posix_acl_default\x00', &(0x7f0000000540)=ANY=[], 0x0, 0x0) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)) utime(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:02:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="6e65742f69705f6d725f6361636865004c58b111e0b5ec253ae152192f210fd9eafcfdadd0550aad69306313a9f530fbc568719354c4516637951d5d8de5a3bd24e962f48e4a1f01bb1fd3fafe2b72a63ee037df1c") read(r0, &(0x7f0000000140)=""/131, 0x51) 22:02:02 executing program 0: listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000380)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410f48fa6b20784175452e1a5454f3a7c44379dfb9d6adbe90dfe298c4a27958c9ab") 22:02:02 executing program 2: clock_gettime(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000008ca6b2179dae5e56b2e670f0f23b60febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb163636f7c02c33ffff") pipe(&(0x7f0000000000)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000180)={0x40, 0x3, 0x0, {0x0, 0x1f, 0x0, '$wlan0em0vmnet1posix_acl_access'}}, 0x40) 22:02:02 executing program 4: getrandom(&(0x7f0000000140)=""/148, 0x94, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000080)="275ef362646576e67b656d3176626f786e6574312a2729656d30272c2800", 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000640)=""/153, 0x99}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000740)="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") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast}, &(0x7f0000000240)=0xc) sysinfo(&(0x7f0000000340)=""/127) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000000c0)={'rose0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) memfd_create(&(0x7f00000002c0)="68d903dad7726c", 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000340)) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000280)={{0x2, 0x0, @multicast1}, {0x0, @random="694bd56c3e80"}, 0x0, {0x2, 0x0, @loopback}, 'bcsh0\x00'}) getpgid(0xffffffffffffffff) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) 22:02:02 executing program 1: remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000680)={0x0, 0x1c9c380}, &(0x7f0000000700)={&(0x7f00000006c0), 0x8}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000000c0)) mlockall(0x0) keyctl$set_reqkey_keyring(0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080), 0x2c) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) flock(0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000740)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:02 executing program 3: getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) times(&(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000980)=@req) sysinfo(&(0x7f0000000b00)=""/245) syz_open_pts(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000002c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0ca24a3a3ef69dc0f01ee0dcea392cb9191a33d0628c4c17a2dbe000000000f993d233d23416b2179bae51a3de5e575e5752eaba6010d64ac1e5d31a3b7e29873bbf1") ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000600)={'veth0_to_bridge\x00'}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000800)) getresgid(&(0x7f00000000c0), &(0x7f00000002c0), &(0x7f00000008c0)) 22:02:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000340)) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) 22:02:02 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000240)=@generic={0x2}) 22:02:02 executing program 0: keyctl$set_reqkey_keyring(0xf, 0xfffffffffffffffd) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000340)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000240)}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) setfsgid(0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) creat(&(0x7f0000000240)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='pids.events\x00', 0x0, 0x0) ppoll(&(0x7f00000003c0), 0x0, &(0x7f00000004c0)={0x77359400}, &(0x7f0000000500), 0x8) prctl$intptr(0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000480)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000001540)='cifs.idmap\x00', &(0x7f0000001580), &(0x7f00000015c0)='pids.events\x00', 0xfffffffffffffffe) add_key$user(&(0x7f0000001600)='user\x00', &(0x7f0000001640), &(0x7f0000001680), 0x0, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000001780), &(0x7f00000017c0)=""/173, 0xad, &(0x7f0000001940)={&(0x7f0000001880)={'wp512-generic\x00'}, &(0x7f00000018c0)}) utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 318.167821] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=257 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.201793] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=11596 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.230929] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=35588 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.259962] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=63464 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.287727] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=60280 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.315468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=33536 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.345586] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2061 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.374530] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=49283 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.402989] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=59414 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 [ 318.434619] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=8 sclass=netlink_audit_socket pig=18810 comm=syz-executor5 22:02:03 executing program 5: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgid() getpgrp(0xffffffffffffffff) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) gettid() geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev, @in=@broadcast}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002880)={{{@in=@broadcast, @in=@local}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002980)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a00)) lstat(0xffffffffffffffff, &(0x7f0000002a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002b80)) stat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) getpid() getresuid(&(0x7f0000006240), &(0x7f0000006280), &(0x7f00000062c0)) lstat(&(0x7f0000006300)='./file0\x00', &(0x7f0000006340)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000063c0), &(0x7f0000006400)=0xc) stat(&(0x7f0000006440)='./file0\x00', &(0x7f0000006480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001040)="42805da0c60fef69dc0f01ee87ce73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:03 executing program 2: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x215}, 0x58) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 22:02:03 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000400)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x407, 0x0, 0x0, {{@in=@loopback, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x42b5}}}, 0xb8}}, 0x0) [ 318.883829] tmpfs: No value for mount option 'hÙÚ×rl' 22:02:03 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000003c0)=@req={0x80}, 0x10) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80}, 0xe1) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000000)=@req={0x80}, 0x10) 22:02:03 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6334488dd25d766070") syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x28}, @dev}, @tcp={{0x0, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000140)) 22:02:03 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000700), &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) epoll_create(0x0) fdatasync(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) sched_getattr(0x0, &(0x7f0000000080), 0x30, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:02:03 executing program 0: memfd_create(&(0x7f0000000000)='\x00', 0x0) pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") socket$nl_netfilter(0x10, 0x3, 0xc) syz_execute_func(&(0x7f0000000400)="42805da0cd0fef69dc0f01eec4617d293973fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6bbf8ddae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fe2bb9500000000") 22:02:03 executing program 4: sysinfo(&(0x7f0000000840)=""/245) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f00000000c0)='veth1_to_bridge\x00') getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:04 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000000900)=[{{&(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000002000)="4618", 0x2}], 0x1, &(0x7f0000003000)}}], 0x1, 0x0) request_key(&(0x7f0000001280)='asymmetric\x00', &(0x7f0000001ffb)={0x73, 0x79, 0x7a, 0xffffffffffffffff, 0x2}, &(0x7f0000001fee)="520972757374e363757367725669643a4465", 0x0) 22:02:04 executing program 0: symlink(&(0x7f0000000180)='\x00', &(0x7f0000000200)='./file0\x00') 22:02:04 executing program 5: add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140), &(0x7f0000000180)="453c6686f60af724a7664e3820ab79cd721aa7c3c523", 0x16, 0xfffffffffffffffd) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={0x2e}, &(0x7f0000000100), 0x390, 0xfffffffffffffffb) 22:02:04 executing program 2: mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:02:04 executing program 1: capget(&(0x7f00000000c0), &(0x7f0000000180)) creat(&(0x7f0000000140)='./file0\x00', 0x0) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='trusted.overlay.impure\x00', &(0x7f0000000240)='/dev/null\x00', 0xa, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) unlink(&(0x7f0000000040)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), &(0x7f0000000500)='\x00', 0xfffffffffffffffc) request_key(&(0x7f00000005c0)='ceph\x00', &(0x7f0000000600), &(0x7f0000000640)="da73656375726974796b657972696e67657468306d643573756d706f7369785f61636c5f6163636573736574683000", 0xfffffffffffffff9) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000680), &(0x7f00000003c0), 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000300)={'ip6gretap0\x00'}) 22:02:04 executing program 4: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x0, 0x0, &(0x7f00000005c0)={0x0, &(0x7f0000000940)}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000600)) clock_gettime(0x0, &(0x7f0000000a80)) openat$null(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000a00)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @broadcast}, 'bond_slave_0\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) clone(0x0, &(0x7f00000004c0), &(0x7f0000000480), &(0x7f00000000c0), &(0x7f00000002c0)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000640)={'veth0_to_team\x00', {0x2, 0x0, @remote}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") uname(&(0x7f0000000540)=""/120) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@ipv4, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000a80)) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000680)={@empty, @mcast2, @dev}) iopl(0x0) gettid() ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000980)='syz0\x00') waitid(0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000000880)) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000006c0)=ANY=[]) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000700)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:02:04 executing program 0: clock_getres(0x0, &(0x7f00000001c0)) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000140)={"66696c05657200", 0x2, [{}, {}]}, 0x48) socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@proc, 0xc, &(0x7f0000000440)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f6445c1d1000f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfd8da3f") getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/227, &(0x7f00000000c0)=0xe3) 22:02:04 executing program 5: signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000900)=ANY=[], 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000580)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000340)={"6070767100000000f4ff00"}, &(0x7f00000005c0)=0x1e) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f00000004c0)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f00000000c0)='\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:04 executing program 4: futex(&(0x7f0000000240), 0x100000000006, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000200)={'bond_slave_0\x00'}) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000280)={'syz_tun\x00', @ifru_settings={0x0, 0x0, @fr_pvc_info=&(0x7f0000000040)={0x0, 'ip6gretap0\x00'}}}) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') 22:02:05 executing program 5: prctl$setname(0xf, &(0x7f0000000180)='\x00') clock_gettime(0x0, &(0x7f0000000380)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 22:02:05 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000280)={@link_local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1, {[@generic={0x1, 0x2}]}}, @icmp=@source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @broadcast}}}}}}, 0x0) 22:02:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0xc, 0x2ed3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r0, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/167}, 0x18) 22:02:05 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000140), 0x8) close(r1) 22:02:05 executing program 0: getrusage(0x0, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) times(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0ca24a3a3ef69dc0f01ee0dcea392cb9191a33d0628c4c17a2dbe000000000f993d233d23416b2179bae51a3de5e575e5752eaba6010d64ac1e5d31a3b7e29873bbf1") 22:02:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='mountinfo\x00') close(r0) 22:02:05 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = socket(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000540)=@filter={'filter\x00', 0xe, 0x2, 0x218, [0x0, 0x200005c0, 0x200005f0, 0x200006f0], 0x0, &(0x7f00000000c0), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xff7fffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'veth1\x00', 'ip6_vti0\x00', 'erspan0\x00', 'bond0\x00', @local, [], @empty, [], 0x70, 0xa0, 0xd0}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}]}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, 'syz_tun\x00', 'yam0\x00', 'bond_slave_1\x00', 'sit0\x00', @dev, [], @link_local, [], 0x70, 0x70, 0xb8}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00'}}}}]}]}, 0x24c) 22:02:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000006, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)) 22:02:05 executing program 1: getrlimit(0x0, &(0x7f0000000000)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000480)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:02:05 executing program 2: listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000400)) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='memory.swap.current\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_execute_func(&(0x7f0000000380)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410f48fa6b20784175452e1a5454f3a7c44379dfb9d6adbe90dfe298c4a27958c9ab") syz_open_pts(0xffffffffffffffff, 0x0) 22:02:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) getdents(r0, &(0x7f0000000040)=""/226, 0xe2) 22:02:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=@ipv6_delrule={0x30, 0x21, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@FIB_RULE_POLICY=@FRA_GOTO={0x8, 0x4, 0x4}, @FIB_RULE_POLICY=@FRA_FWMARK={0x8}]}, 0x30}}, 0x0) 22:02:05 executing program 5: getrandom(&(0x7f0000000500)=""/104, 0x9c, 0x3) keyctl$set_reqkey_keyring(0x4, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000280), &(0x7f0000000080)}}, &(0x7f0000000300)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) timer_getoverrun(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000ac0)='pkcs7_test\x00', &(0x7f0000000b00), &(0x7f0000000b40)='veth1\x00', 0xfffffffffffffffa) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:02:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000140)={0x3, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @local}}}, 0x108) 22:02:06 executing program 4: epoll_create(0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000140)={0x12509e3bf4d420d4}, 0x7) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000300)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) getuid() stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@mcast2, @in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002940), &(0x7f0000002980)=0xc) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002dc0), &(0x7f0000002e00)=0xc) getegid() lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) fstat(0xffffffffffffffff, &(0x7f0000002f00)) geteuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c740)={{{@in, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000079c0)=0x1000002c3) fstat(0xffffffffffffffff, &(0x7f0000003340)) lstat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003400)) 22:02:06 executing program 0: r0 = socket$packet(0x11, 0x400000003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) unshare(0x20400) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f00000002c0)=0x6, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f0000000140)}, 0x10) 22:02:06 executing program 1: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[]}}, 0x0) socketpair$inet6(0xa, 0xe, 0x0, &(0x7f0000000200)) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=@known='security.SMACK64EXEC\x00', &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:06 executing program 3: clock_gettime(0x0, &(0x7f0000000380)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:02:06 executing program 2: accept4$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000340)=0x6e, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000003c0), &(0x7f00000006c0)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:02:06 executing program 5: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040)={0xfffffffffffffffe}, 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:02:06 executing program 0: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x139, &(0x7f0000000080)}) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) keyctl$set_reqkey_keyring(0xb, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000140)) add_key(&(0x7f00000003c0)='blacklist\x00', &(0x7f0000000400), 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000240), &(0x7f00000005c0), 0x0, 0x0) clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000080), 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) getpid() wait4(0x0, &(0x7f0000000280), 0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:06 executing program 4: syz_extract_tcp_res$synack(&(0x7f0000000080), 0x1, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) prctl$setptracer(0x59616d61, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') memfd_create(&(0x7f0000000400)='@mime_typecpuset\x00', 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[]}}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000140), 0x4) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:02:06 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000140)) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f3821f2450f38f1c3f0768c8400d9fcc481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5c44150555cc6af7545c4010d64ac1e5d31a3b744dbe271fb26f00f2dbb9500000000") 22:02:06 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000740)=ANY=[], 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c40)) getpid() getuid() stat(&(0x7f0000002240)='./file0\x00', &(0x7f0000002280)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002300)) getresuid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002400), &(0x7f0000002440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002580)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000002680)=0xe8) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) getresuid(&(0x7f00000027c0), &(0x7f0000002800), &(0x7f0000002840)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgid() getpgid(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002c00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002c80), &(0x7f0000002cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000002fc0)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) geteuid() getgroups(0x0, &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000030c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000031c0)=0xe8) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getegid() gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d00)={{{@in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000003e00)=0xe8) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getpgid(0x0) geteuid() getgroups(0x0, &(0x7f0000007500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003f40)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000004040)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) stat(&(0x7f0000004180)='./file0\x00', &(0x7f00000041c0)) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:07 executing program 2: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f00000003c0), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e00)=""/4096) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) restart_syscall() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) rt_sigpending(&(0x7f0000000080), 0x8) socket$inet6(0xa, 0x0, 0x0) syz_execute_func(&(0x7f0000000d80)="428055a08f6969ef69dc00d9c4e17911466fc841ff0f1837c4c3397c2a060f38211a40a5819086d9f28fc9410feee50f50e67545c421a22a04a00f2e1a1a0126460fe4e731a3b786e2989f7f") 22:02:07 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000040)="ab2dd646df54534d07f690362f17cf81a840518aa19771c73cf53372ed5d28a5ff882f7a97b24b4dc07e34e0195c651e6e44ebde937d6bca48ef46b3427325b06cfbda5c1bec7b443a66d1d33e9fcba3851fd143e68d67babf49e13f2576836abe5797a545a8dfe7d16c8cc50aab1e6ea54108e63e2f273cf3ead3b5d4b155a0a0001c6e73afe0210d8a", 0x8a) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:02:07 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={&(0x7f0000000b40), 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0xc, 0x5, [@IFLA_BRPORT_GUARD={0x8}]}}}]}, 0x44}}, 0x0) 22:02:07 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") sendto$inet(r0, &(0x7f0000000180), 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000200)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) sendto$inet(r0, &(0x7f00000005c0)="1a", 0x1, 0x0, &(0x7f0000000100)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='bbr\x00', 0x4) shutdown(r0, 0x1) 22:02:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300090e0000006fb43ced0000000005000600000000000a0000000000000004000000000000000000000000000000000000000000000002000100000000000000fb020000000005000500000000000a00000000000000ff0100000000000000000000000000010000000000000000"], 0x70}}, 0x0) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x9, 0x0, 0x9, 0x2}, 0x10}}, 0x0) 22:02:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x2, 0x4, 0x4, 0x800000000400, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 22:02:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000380)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f00000003c0)=0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) recvmsg(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000003ac0)=""/4096, 0xfdbf}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) shutdown(r1, 0x1) 22:02:08 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2715, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0x3e3) 22:02:08 executing program 5: setrlimit(0x0, &(0x7f0000000040)={0x9}) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000840), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/loop-control\x00', 0x0, 0x0) memfd_create(&(0x7f0000000a40)='\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:02:08 executing program 0: capset(&(0x7f0000000140)={0x19980330}, &(0x7f0000000180)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 22:02:08 executing program 2: r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x5, &(0x7f000045fff8)) 22:02:08 executing program 2: socket$inet6(0xa, 0x2, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000380), 0x6) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) syz_open_procfs(0x0, &(0x7f0000000340)='net/ipx\x00') syz_open_pts(0xffffffffffffffff, 0x0) pipe(&(0x7f0000007680)) ioctl$void(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff2e0ac4010d64ac1e5d31a314b706e298987b7f") bind$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f00000001c0)=@nfc, 0x80, &(0x7f0000000600), 0x0, &(0x7f00000000c0)=""/106, 0x6a}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 22:02:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000280)='uid_map\x00') clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="9a", 0x1}], 0x1) 22:02:08 executing program 4: setrlimit(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:02:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:02:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key(&(0x7f00000002c0)="00000000000000000000a49dc4a29db2025828f5830d93928fc9f6522efbb48d2b8fb7c64ac0962e427d9360108951eba08524a2efa31e7f5662a37bf179117ef2e09fbcb0ebda995049fb4864564cf677dde72e640ee56383d91ec238795bc734e472ef093aad7a2c26f32bfb6f2fbb5614cef252268528f05a2a3fd3401bf93d", &(0x7f0000000080), &(0x7f0000000400)="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", 0x16a, 0x0) 22:02:08 executing program 5: clock_adjtime(0x0, &(0x7f0000000740)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000ac0)) fstat(0xffffffffffffffff, &(0x7f0000000b40)) clock_gettime(0x0, &(0x7f0000000a80)) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000140)={0x77359400}) seccomp(0x0, 0x0, &(0x7f0000000880)={0x0, &(0x7f0000000840)}) openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000540)) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)}}, 0x18) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000500)={@loopback}, 0x20) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) getpid() creat(&(0x7f0000000200)='./file0\x00', 0x0) getpgid(0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=""/216, 0xd8}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000005c0)) futimesat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', &(0x7f00000004c0)) getuid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000d00)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000180), 0xc, &(0x7f0000000580)={&(0x7f0000000780)=ANY=[]}}, 0x0) set_tid_address(&(0x7f0000000b00)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/95) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000240)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000a00)="42805da0bd0fef69dc0f01eece73fec4427d5aa0bf000000380f1af3f0817e768cc8000058000000b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b771fb3602") 22:02:09 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:02:09 executing program 1: futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000500), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) add_key(&(0x7f0000000300)='id_resolver\x00', &(0x7f0000000340), &(0x7f0000000240), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600), 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000940), &(0x7f0000000880), 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), 0x14) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000140)=0x10) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01ee0dce41ff0fc4a33d062900370f38211ac4410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b770989f7f") keyctl$update(0x2, 0x0, &(0x7f0000000300), 0xfffffdff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x298) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) 22:02:09 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) 22:02:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x7, &(0x7f0000000080), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, "6e2a30456b886bc2165b41fe6900", 'yam0\x00', 'yam0\x00', 'veth1_t/_bond\x00', @link_local, [], @link_local, [], 0x70, 0xe8, 0x118}, [@common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "17d122d4e27ebdf3b9dc569e338e2c551c2fc4a19597ba4c501c8b1f16fb7809c40aee86d9a0ef7981f4af1506f4fe16383d2afb577ed2bb6dd99f024b3f54ba"}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1e8) 22:02:09 executing program 4: memfd_create(&(0x7f0000000040)='\x00', 0x0) prctl$getreaper(0x2, &(0x7f0000000140)) 22:02:09 executing program 4: clock_getres(0x2, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)) pipe(&(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000001c0)) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000380), &(0x7f0000000400)={&(0x7f00000003c0), 0x8}) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0be0fef69dc0f01eece73fec4e15e61763f3f0f38218c0bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54136660f5c100f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 22:02:09 executing program 2: rename(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) prctl$setmm(0x23, 0x0, &(0x7f0000c00000/0x400000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) pipe2(&(0x7f0000000400), 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200), 0x4) keyctl$set_reqkey_keyring(0xb, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) memfd_create(&(0x7f0000000380)='cgroup\x00', 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000300)={'security\x00', 0x2, [{}, {}]}, 0x48) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:02:09 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffd) accept4(0xffffffffffffff9c, &(0x7f0000000f80)=@rc, &(0x7f00000007c0)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @remote, @multicast2}, &(0x7f0000001940)=0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000bc0), 0xc, &(0x7f00000019c0)={&(0x7f0000001980)=@getstats={0x1c}, 0x1c}}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @remote}, &(0x7f0000000200)=0x6c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@broadcast, @rand_addr}, &(0x7f0000000300)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0xfffffffffffffe58, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005cc0), 0x0, 0x0, &(0x7f0000005f00)={0x0, 0x1c9c380}) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x450) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000580)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000009c0), 0x0, &(0x7f00000002c0)=""/1, 0x1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0xd23243491e3c9b31) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001e00)={0x8, "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", 0x1000}, 0x1006) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000001000)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) geteuid() lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000500)) getpgid(0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000a80)={'lo\x00', {0x2, 0x0, @rand_addr}}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) getresgid(&(0x7f0000000600), &(0x7f0000001ac0), &(0x7f0000001dc0)) sendto$unix(0xffffffffffffffff, &(0x7f00000010c0), 0x0, 0x0, &(0x7f0000001140)=@abs, 0x6e) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) syz_execute_func(&(0x7f0000001040)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000fc0), 0x0, 0x0) 22:02:09 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x3e, &(0x7f00002cef88)="5780d01c", 0x4) sendto$inet6(r0, &(0x7f0000000280)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524009ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d5749f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad66070d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8be000000", 0x5ad, 0x0, &(0x7f0000809000)={0xa, 0x1000000000004e20, 0x0, @mcast2}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000180)=""/72, 0x48, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @remote}, 0x705000) 22:02:10 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f000039a000)=[{0x30, 0x0, 0x0, 0xfffff030}, {0x6}]}, 0x10) 22:02:10 executing program 1: utimes(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x0, 0x2710}, {0x77359400}}) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) add_key(&(0x7f0000000940)='.request_key_auth\x00', &(0x7f0000000a00), &(0x7f0000000a40), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) getrlimit(0x0, &(0x7f0000000280)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x2000)=nil) getpeername(0xffffffffffffffff, &(0x7f0000000700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000500)=0x80) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) getgroups(0x0, &(0x7f0000000180)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000080)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) pipe2(&(0x7f0000000040), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000340)={0xa0}, 0xa0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) memfd_create(&(0x7f0000000200)='/dev/hwrng\x00', 0x0) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6}]}) syz_execute_func(&(0x7f0000000400)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") getuid() syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@mcast1}, &(0x7f0000000540)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000005c0)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000700)={@local}, &(0x7f0000000740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@remote, @in6}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@dev, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) 22:02:11 executing program 3: r0 = open(&(0x7f0000000200)='./file0\x00', 0x14104a, 0x0) write$evdev(r0, &(0x7f00000001c0)=[{{}, 0x1, 0x74, 0x2}], 0x18) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0xffffffff) r1 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, &(0x7f0000000140), 0x100040001) 22:02:11 executing program 0: getrusage(0x0, &(0x7f0000000180)) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000140)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000240)={0x50}, 0x50) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00000000c0)) 22:02:11 executing program 4: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') getresuid(&(0x7f0000000300), &(0x7f00000008c0), &(0x7f0000000880)) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x0, &(0x7f0000b6b000), &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200)) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000001180)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") socket$inet(0x2, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001480)=ANY=[], 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001280)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000001400)=0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000000c0)=""/4096, &(0x7f00000010c0)=0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='vboxnet0-\x00', 0xffffffffffffff9c}, 0x10) vmsplice(0xffffffffffffffff, &(0x7f0000001480), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000001200), 0x14) 22:02:11 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x4000800000005452, &(0x7f0000000000)=0x1000000009) shutdown(r2, 0x2) 22:02:11 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000)=0x1a, 0x4) 22:02:11 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x80000000000014, &(0x7f0000000140), 0x0) 22:02:11 executing program 5: bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, 0x6e) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f00000002c0)=0x398) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xbb, &(0x7f0000000cc0)="1ac77aa0d413eb387a67c20e76a978190d3d8986b502cc5c41dcbbf5766d6e120bd95a686674760935958f8a151e86d7eea5128a15f80c9cc8837d67cf53bcf51be7d31988434e2a6ce2917eaee729cab5caeb2c2448ec075ac1b99dc7b39dc218595911e8e77dfa1e09370a2345c0e2f5dee2cc8b821de4bb3b653e9f46ed9ad90af933dc5b03984d2c2c89b649c4a939eb1733372d91ff18f1fdd5ac05f2a9f383be6f0e850e1edbfe7beb6a938f83da9983dc5200d7ced4080e"}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01ee73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b00000021676b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x7fe, 0xb7) sendto$inet(r0, &(0x7f00000002c0), 0x0, 0x8080, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x3b, 0x0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) recvfrom$inet(r0, &(0x7f00000001c0)=""/248, 0xf8, 0x40012000, 0x0, 0xfd12) 22:02:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket(0x2, 0x3, 0x100000001) sendto$inet(r1, &(0x7f0000000380)='1B', 0x2, 0x2000c844, &(0x7f0000000200), 0x10) sendto$inet(r1, &(0x7f0000000080), 0xff45, 0x0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) 22:02:11 executing program 1: unshare(0x20400) readahead(0xffffffffffffffff, 0x0, 0x0) 22:02:11 executing program 2: io_setup(0x1, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) fstat(0xffffffffffffff9c, &(0x7f0000000300)) setresuid(0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:11 executing program 1: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000180)) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000001c0)=""/80) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000000140)) r1 = gettid() tkill(r1, 0x15) 22:02:12 executing program 3: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) getuid() getgid() getpid() lstat(&(0x7f0000000240)='.\x00', &(0x7f0000000080)) unlink(&(0x7f0000000180)='./file0\x00') open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000280), 0x8, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") 22:02:12 executing program 4: futex(&(0x7f0000000400), 0xb, 0x4, &(0x7f0000000280)={0x77359400}, &(0x7f0000000180), 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000400)) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000440)={0xa0}, 0xa0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}) socket$unix(0x1, 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000800)=0xc) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:02:12 executing program 5: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f00000001c0)) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) 22:02:12 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000340), 0x12) 22:02:12 executing program 0: epoll_create1(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) getuid() getgid() getpid() lstat(&(0x7f0000000240)='.\x00', &(0x7f0000000080)) unlink(&(0x7f0000000180)='./file0\x00') open(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000280), 0x8, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getgid() getgroups(0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000001600)) seccomp(0x0, 0x0, &(0x7f0000000100)) 22:02:12 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) writev(r0, &(0x7f0000001c00)=[{&(0x7f0000000ac0)="c5", 0x1}], 0x1) 22:02:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0x14}}, 0x0) 22:02:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_bond\x00'}) sendmmsg(r2, &(0x7f0000000700)=[{{&(0x7f00000001c0)=@ll={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000240)="9b04a7048d9079bd14c655784324", 0xe}], 0x1}}, {{&(0x7f0000000640)=@sco={0x1f, {0x0, 0x0, 0x8510, 0x0, 0x0, 0x9}}, 0x80, &(0x7f00000006c0)}}], 0x2, 0x0) 22:02:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001240)='auxv\x00') clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000140)='bridge_slave_0\x00', 0x7fffffff}) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000001c0)=""/4096) pipe(&(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet(r2, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000011c0)={0x2, 0x4e20, @broadcast}, 0x10) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000001200)={0x0, 0x7, [@local, @link_local, @broadcast, @empty, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @empty, @dev={[], 0xd}]}) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000001280)=0x5) ioctl$RTC_WIE_ON(r2, 0x700f) 22:02:12 executing program 2: unshare(0x8000400) r0 = inotify_init1(0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 22:02:12 executing program 2: clock_getres(0x2, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_dev$rtc(&(0x7f0000000680)='/dev/rtc#\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000300)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x80}, 0x28, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:02:13 executing program 5: getresuid(&(0x7f00000001c0), &(0x7f0000000180), &(0x7f00000003c0)) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0xd4}, 0x28, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x1) keyctl$set_reqkey_keyring(0xb, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) memfd_create(&(0x7f0000000200)='cgroup\x00', 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in=@remote, @in6=@mcast1}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000d40)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a046eec4020d912c3918afc4e2edaa043c66440f383b9dfd000000c4c19086d9f28fc9660fc0c16b2179a6e5e54175610fad2e1a1a010dafac865d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 22:02:13 executing program 3: memfd_create(&(0x7f0000000a80)='rxrpc\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@local, @in=@loopback}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000240)={@local}) pipe(&(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) fstat(0xffffffffffffffff, &(0x7f0000000280)) memfd_create(&(0x7f0000000540)='\x00', 0x0) time(&(0x7f0000000000)) request_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00\x00\x00\x00\x00', 0xfffffffffffffffb) add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000700), &(0x7f0000000740), 0x0, 0xfffffffffffffff8) add_key(&(0x7f00000007c0)='rxrpc\x00', &(0x7f0000000800), &(0x7f0000000840), 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000940), &(0x7f0000000980)=""/201, 0xc9, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0), &(0x7f00000002c0)='keyring\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f0000000440)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x4) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000400)={'0\x00', @ifru_ivalue}) socket$unix(0x1, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x100, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0xfffffffffffffedd, 0x2000012c, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r0) 22:02:13 executing program 0: keyctl$set_reqkey_keyring(0x10, 0x0) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffff8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 22:02:13 executing program 2: clock_gettime(0x7, &(0x7f0000000540)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000440)={0x0, @aes128, 0x0, "dc031e13b685cd4a"}) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/174, &(0x7f00000004c0)=0xae) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") [ 328.772055] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 22:02:13 executing program 2: clock_gettime(0x7, &(0x7f0000000540)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000400)=0x1c, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000440)={0x0, @aes128, 0x0, "dc031e13b685cd4a"}) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) pipe(&(0x7f0000000380)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000003c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xc) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580)=""/174, &(0x7f00000004c0)=0xae) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) syz_execute_func(&(0x7f0000000680)="42805da0120fef69dc0f01eece73fe67f0f75efbfa0f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:13 executing program 2: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0), 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, 0x0, 0x0) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000200)=0x14) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@loopback}, &(0x7f0000000240)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={0x0, 0x1, 0x6, @remote}, 0x10) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000540)) socket$packet(0x11, 0x0, 0x300) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") 22:02:14 executing program 5: madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xc) clock_gettime(0x0, &(0x7f0000001680)) clock_gettime(0x0, &(0x7f0000000480)) clock_nanosleep(0x0, 0x0, &(0x7f0000000200), &(0x7f00000002c0)) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=""/35, &(0x7f0000000400)=0x23) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 22:02:14 executing program 4: socketpair$unix(0x1, 0x400000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x7156b1e93bb5b4df) dup2(r0, r1) [ 329.569620] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 22:02:14 executing program 1: clock_gettime(0x0, &(0x7f0000000180)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={@rand_addr, @broadcast}, &(0x7f0000000140)=0xc) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000040)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:14 executing program 0: quotactl(0x480000101, 0x0, 0x0, &(0x7f0000000440)) 22:02:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0xfffffffffffffffa) socket$nl_xfrm(0x10, 0x3, 0x6) keyctl$get_keyring_id(0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) gettid() getpgrp(0x0) getpgrp(0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:02:14 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) unshare(0x2000400) readahead(r0, 0x0, 0x0) 22:02:15 executing program 3: clock_gettime(0xfffffffffffffffe, &(0x7f0000000800)) clock_settime(0x0, &(0x7f00000002c0)) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000440)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x200}, 0x28, 0x0) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x1ae, &(0x7f0000000c80), 0x0, &(0x7f0000000c00)}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in6=@mcast2, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0x323) getpeername$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000bc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001040)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@ipv4={[], [], @dev}, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001180)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001300)={'bond_slave_0\x00'}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000400), 0xc, &(0x7f0000001840)={&(0x7f0000002600)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000440)}) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000340)={@loopback}, &(0x7f0000000600)=0x139) clock_gettime(0x0, &(0x7f0000000680)) finit_module(0xffffffffffffffff, &(0x7f0000000080)='lo.em1eth0trusted$\x00', 0x0) 22:02:15 executing program 0: r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="a1", 0x1}], 0x1) 22:02:15 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x2) ioctl$LOOP_SET_FD(r0, 0x4c02, 0xffffffffffffffff) 22:02:15 executing program 5: syz_extract_tcp_res(&(0x7f0000000140), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000180), 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f00000005c0)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000b40)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:15 executing program 1: pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 22:02:15 executing program 4: memfd_create(&(0x7f0000000380)="1ac77aa0d413eb387a67c20e76a978190d3d8986b502cc5c41dcbbf5766d6e120bd95a686674760935958f8a151e86d7eea5128a15f80c9cc8837d67cf53bcf51be7d31988434e2a6ce2917eaee729cab5caeb2c2448ec075ac1b99dc7b39dc218595911e8e77dfa1e09370a2345c0e2f5dee2cc8b821de4bb3b653e9f46ed9ad90af933dc5b03984d2c2c89b649c4a939eb1733372d91ff18f1fdd5ac05f2a9f383be6f0e850e1edbfe7beb6a938f83da9983dc5200d7ced4080e", 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, 0x6e) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f00000002c0)=0x398) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xbb, &(0x7f0000000cc0)="1ac77aa0d413eb387a67c20e76a978190d3d8986b502cc5c41dcbbf5766d6e120bd95a686674760935958f8a151e86d7eea5128a15f80c9cc8837d67cf53bcf51be7d31988434e2a6ce2917eaee729cab5caeb2c2448ec075ac1b99dc7b39dc218595911e8e77dfa1e09370a2345c0e2f5dee2cc8b821de4bb3b653e9f46ed9ad90af933dc5b03984d2c2c89b649c4a939eb1733372d91ff18f1fdd5ac05f2a9f383be6f0e850e1edbfe7beb6a938f83da9983dc5200d7ced4080e"}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000780)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) geteuid() lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000900)) getpid() getuid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000980)) getpid() fstat(0xffffffffffffffff, &(0x7f0000000a00)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getuid() getgroups(0x0, &(0x7f0000000b40)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@remote, @in=@broadcast}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000000c80)=0xe8) getgid() gettid() stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getgid() fstat(0xffffffffffffffff, &(0x7f00000017c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001840)) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01ee73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b00000021676b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:15 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000640), 0x155555555555556a, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000380)={0x0, @aes128, 0x0, "e4f957311b68b800"}) connect$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @local}, 0x10) execveat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', &(0x7f0000000500), &(0x7f00000004c0), 0x0) execveat(0xffffffffffffffff, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000640), &(0x7f0000000740), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstat(0xffffffffffffffff, &(0x7f0000000440)) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='/dev/full\x00'}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000280)=0xe8) alarm(0x0) 22:02:15 executing program 2: getrandom(&(0x7f0000000200)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, &(0x7f0000000040)=0xfffffffffffffc35, 0x0) seccomp(0x0, 0x0, &(0x7f00000007c0)={0x0, &(0x7f0000000780)}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000280)=""/22) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in=@broadcast}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getuid() ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={'veth1\x00', {0x2, 0x0, @multicast1}}) accept4$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @multicast2}, &(0x7f0000000740)=0x10, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) 22:02:16 executing program 5: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000001640)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:02:16 executing program 1: getrusage(0x0, &(0x7f0000006440)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x1fe, &(0x7f00000000c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f0000000900)='/dev/zero\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000280)) getpgid(0x0) syz_open_dev$loop(&(0x7f0000000ac0)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fchmod(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000140)="428055a02a6969ef69dc00d9e37d0fe1ff6920375137c339b52a8e0f38211adba564a70f97afbb00000040420fb0c7e5e5417545800f2e1a1a01460f01eec4e1472a77b0262e6426f30f2b05097402003f") getpgid(0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000200)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000a80)) memfd_create(&(0x7f0000000300)='/dev/zero\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000001c0)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006040), 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) 22:02:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)=""/67, &(0x7f0000000100)=0x43) 22:02:16 executing program 2: setpriority(0x2, 0x0, 0x3a5) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5410f71e2006766f342cd570f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 22:02:17 executing program 3: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58feb}]}) syz_execute_func(&(0x7f0000000680)="428055a03b1a1a69ef69dc00d9fbf3440f6f50e2692037370dc305bd060f38015d40a564a70f157a9e400f01efe5e5a2fd45c962050906002e660fe095000000003ef0f6585501410fa931a3b786e298dd3f227992dd289f410f0f8084170000ae") 22:02:17 executing program 0: listxattr(&(0x7f0000001300)='.\x00', &(0x7f0000001380)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000200), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='cifs.spnego\x00', &(0x7f0000000180), &(0x7f00000012c0), 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000043c0)='syz0\x00') getpgid(0x0) stat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgroups(0x0, &(0x7f0000004300)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004900)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000004400)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004b00)={{{@in=@rand_addr, @in6=@local}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c40), &(0x7f0000004c80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004cc0), &(0x7f0000004d00)=0xc) statfs(&(0x7f0000003300)='./file0\x00', &(0x7f0000004d40)=""/4096) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000380)=@proc, 0xc) mknod$loop(&(0x7f0000000240)='./file0\x00', 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000140)='&&\x00', 0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000300), 0x4) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3cf69dc0f01ee0dac8e8ecbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4a10d72d2cce29873bb7f") 22:02:17 executing program 4: r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write$binfmt_misc(r0, &(0x7f00000001c0)={'syz0', "79276f6e730a2366ae020837b0c013bfc09f16fc2f7aa3e50794c7d346c2226bbe9a7262c4a02c342bb021f32dff160ddbe2bc1dfced0f37ae65c9444ef84369b5f95618eb07a30f4a1275c141f2e829127a35e274d3e4d585e984dc8457369d12c6e4196f5a69482946e33cd3f195c165fbc2bc226d1d19e1d3c3dcb6234afd1e877554adea4b58cd63abf3e44963fc"}, 0x94) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='romfs\x00', 0x0, &(0x7f00000001c0)) 22:02:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002000)=ANY=[@ANYBLOB="b70000000000000007000000000000219500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000006f3d)=""/195}, 0x48) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) 22:02:17 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0xffffffff) recvfrom(r0, &(0x7f0000000000)=""/79, 0x4f, 0x0, &(0x7f00000001c0)=@nfc, 0x80) 22:02:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000020c0)={{{@in=@multicast1, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x3, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x7}, {0x0, 0x0, 0x80}, 0x8}, {{@in6=@mcast1, 0x0, 0xff}, 0x0, @in=@remote, 0x0, 0x7, 0x0, 0x5fd}}, 0xe8) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x19) 22:02:17 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) socket(0x2, 0x3, 0x3) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) 22:02:17 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) 22:02:17 executing program 4: pipe(&(0x7f0000000040)) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000380)=""/4096) clock_getres(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01fecf73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f3a1dfd1a2f8000000006b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") dup(0xffffffffffffffff) 22:02:17 executing program 5: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@multicast1, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) getegid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000e40)={0x10}, 0x10) unshare(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000240)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000440)) getresgid(&(0x7f00000003c0), &(0x7f00000004c0), &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000540)) syz_execute_func(&(0x7f0000000ac0)="af8055a0596969ef69dc00d947f6d466410f60bad33f00007c2ac462193e7007afaf40f75e00437373a7c4a2f930b80e70714b660fc42608efc58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e698c402492c31") 22:02:17 executing program 1: mmap(&(0x7f0000000000/0xd000)=nil, 0xd000, 0xd, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00006cdffb)="8907040000", 0x5) getsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f0000000140)=""/225, &(0x7f0000000000)=0xe1) 22:02:17 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) sync_file_range(r0, 0x0, 0x0, 0x0) 22:02:18 executing program 3: memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000000)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000080)="428055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000003c0)=@generic) syz_extract_tcp_res(&(0x7f00000002c0), 0x0, 0x0) 22:02:18 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000480), 0xc, &(0x7f0000000180)={&(0x7f0000000b00)=@acquire={0x2a4, 0x17, 0x203, 0x0, 0x0, {{@in=@local}, @in, {@in=@remote, @in=@remote}, {{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x6e6bb0}}, [@sec_ctx={0x9c, 0x8, {0x97, 0x8, 0x1, 0x9b, 0x8f, "535c9878bd3a3835b8628e89a97465105c0a95b778ad3e71d1ae2c3341c951810168943f79004642b1dc2d4c15ab72a5b3598cf1583801c47f913d092d3a26891f28eaeed2e36ac7e4f1a0185a2865af80b961d0c492c3ee840645886866b9675ccdea106400790ad94b63fe08211b0f029dea1b6cb58af85c6f9d974524c0cfcb8b9f16aea146d49eac4f478d5946"}}, @migrate={0xe0, 0x11, [{@in6=@mcast2, @in6=@mcast1, 0x32, 0x0, 0x0, 0x3502, 0xa, 0x2}, {@in6, @in6, 0x3b, 0x1, 0x0, 0x34ff, 0x2, 0x2}, {@in6=@remote, @in6=@remote, 0xff, 0x0, 0x0, 0x3505, 0xa, 0xa}, {@in6=@mcast2, @in6=@mcast1, 0xff, 0x1, 0x0, 0x3505, 0x3cd5c103608596a, 0x2}, {@in=@local, @in6=@mcast2, 0x7f, 0x3, 0x0, 0x34ff, 0xa, 0xa}]}]}, 0x2a4}, 0x8, 0x0, 0x0, 0x400}, 0x0) 22:02:18 executing program 5: unshare(0x400) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 22:02:18 executing program 0: r0 = memfd_create(&(0x7f0000001fc1)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r0, &(0x7f0000000140)="2fcf83ca0ae368564b6b9c7cff2ba0611029b73b8903f1fe6e7bd875768c6ebc2346a49d41c4a316d308e008a49642e736c4aa06", 0x34) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) 22:02:18 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00', 0x2, "c1fe"}, &(0x7f0000000000)=0x26) vmsplice(r0, &(0x7f0000000040), 0x100000000000032d, 0x0) 22:02:18 executing program 4: unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) pipe2$9p(&(0x7f0000000040), 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140), 0x20) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) socket$inet_udp(0x2, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) getsockname(0xffffffffffffffff, &(0x7f00000003c0)=@alg, &(0x7f0000000440)=0x80) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000004c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000580)) creat(&(0x7f0000000080)='./file0\x00', 0x0) io_setup(0x0, &(0x7f00000005c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, &(0x7f0000000740)) 22:02:18 executing program 5: clone(0x600, &(0x7f0000000480), &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000005940)) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000280)) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) setpriority(0x0, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280), 0x88) 22:02:18 executing program 1: ustat(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 22:02:18 executing program 0: ppoll(&(0x7f0000000280), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) add_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000180), &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x2d6, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0), 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, 0x0, 0x0) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000600)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab2f0000000cac4e1057668d54cca670f38020a0f010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:02:18 executing program 5: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80000001}, 0x4e) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) 22:02:18 executing program 5: unshare(0x40000000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0), 0x4) 22:02:18 executing program 5: unshare(0x40000000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0), 0x4) 22:02:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0xaf2}) read(r1, &(0x7f0000000080)=""/19, 0xffffff5c) 22:02:19 executing program 1: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000007c0), 0xc) bind(0xffffffffffffffff, &(0x7f0000000480)=@in={0x2, 0x0, @broadcast}, 0x80) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) restart_syscall() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000700)) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) getxattr(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)=@random={'security.', '/(trustedcpuset\x00'}, &(0x7f0000000880)=""/42, 0x2a) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 22:02:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$unix(r0, &(0x7f0000000040), 0x0, 0x11, &(0x7f00000001c0)=@abs, 0x6e) 22:02:19 executing program 2: pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000000740), 0x0) 22:02:19 executing program 5: unshare(0x8000400) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x0, &(0x7f0000000040)) exit(0x0) creat(&(0x7f0000000080)='./file0/bus\x00', 0x0) 22:02:19 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 22:02:19 executing program 0: syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000003c0)=""/215) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000040)) fdatasync(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f00000015c0)={0x1, &(0x7f0000001600)=[{0x6, 0x0, 0x0, 0x58fe0}]}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@broadcast}, &(0x7f0000000080)=0xc) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000000080)}}, &(0x7f0000000240)) fchmod(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0ad520fc5f0e4ef84dc0f01eece660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:02:19 executing program 4: socket$unix(0x1, 0x2, 0x0) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) socket$unix(0x1, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e57aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 22:02:20 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000140)=0x2, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 22:02:20 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_buf(r0, 0x29, 0xd0, &(0x7f0000000100)=""/66, &(0x7f0000000240)=0xfffffffffffffefe) 22:02:20 executing program 1: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000000)={0x1c2}, 0x10) 22:02:20 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000140)={{}, {0x0, @local}, 0x0, {0x2, 0x0, @rand_addr}, 'teql0\x00'}) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xe8) bind(0xffffffffffffffff, &(0x7f0000000380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80) syz_execute_func(&(0x7f00000001c0)="428055a03769ef69dc3641ff0aaa42d9fb333333c2c462d5900cb5f08800008e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a076968c463fd7998b400ba000079aaff43d0e1465a355a35a11b000000010d64ac1e5d058698987f") 22:02:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000000c0), 0x8) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f000042d000)=@routing={0x0, 0x2, 0x2, 0x0, 0x0, [@mcast1]}, 0x18) 22:02:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000040)={'bond0\x00\x00Z\x00', @ifru_ivalue=0x10001}) 22:02:20 executing program 4: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x800}]}, 0x10) sendmsg(r0, &(0x7f0000001440)={&(0x7f0000000140)=@in6={0xa, 0x4e21}, 0x80, &(0x7f0000000000)=[{&(0x7f0000001480)="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", 0x7c3}], 0x1}, 0x8000) sendmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)}, 0x0) 22:02:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pkey_free(0xffffffffffffffff) 22:02:20 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x100000000000038a, 0x0) 22:02:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000cc0)) getresgid(&(0x7f0000000300), &(0x7f0000000180), &(0x7f00000001c0)) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000680)=0xc) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000500), &(0x7f0000000540)=0x30) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000001c0)=""/134, &(0x7f0000000280)=0x86) socket$inet6_udp(0xa, 0x2, 0x0) prctl$getreaper(0x0, &(0x7f0000000040)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000580)={0x0, &(0x7f0000000040)}) getgid() syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") 22:02:20 executing program 0: timerfd_create(0x7, 0x0) uname(&(0x7f00000003c0)=""/145) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) fchdir(0xffffffffffffffff) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000540)={0x18}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) write$tun(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 22:02:21 executing program 2: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 22:02:21 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) getgroups(0x1, &(0x7f0000000240)=[0xee00]) 22:02:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x14, 0x26, 0x200000601}, 0x14}}, 0x0) 22:02:21 executing program 3: clock_gettime(0x8, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000000)) 22:02:21 executing program 5: r0 = socket(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6tnl0\x00', 0x10) sendmmsg$unix(r0, &(0x7f0000001f40)=[{&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000440)="ab58", 0x2}], 0x1, &(0x7f0000000480)=[@rights={0x10}], 0x10}], 0x1, 0x0) 22:02:21 executing program 4: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) unshare(0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000001c0)=""/23, &(0x7f0000000200)=0x17) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000240)={'team_slave_0\x00', @ifru_addrs=@hci}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000140)='syz0\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)="ed00000076") 22:02:21 executing program 5: ppoll(&(0x7f0000000280), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) add_key(&(0x7f0000000080)='logon\x00', &(0x7f00000000c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) keyctl$assume_authority(0x10, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000180), &(0x7f0000000300)) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x2d6, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0), 0x0, 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000600)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab2f0000000cac4e1057668d54cca670f38020a0f010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 22:02:21 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000000040), 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x27, 0xaff, 0x0, 0x0, {0x15}}, 0x14}}, 0x0) 22:02:21 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000740), 0x0, &(0x7f0000000780)={0x0, 0x1c9c380}, 0x8) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f00000001c0)}) mremap(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) clock_gettime(0x0, &(0x7f00000000c0)) futex(&(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000900), &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000500)={0x18}, 0xff70) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000001ac0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000200), 0x0, 0x0) unshare(0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001080)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000480), &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in6=@local, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000d00)=0xe8) getgid() getpgid(0xffffffffffffffff) getresuid(&(0x7f0000000d40), &(0x7f0000000dc0), &(0x7f0000000e00)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e40)) getuid() lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000001c0), 0x0, &(0x7f00000009c0)}, 0x0) execveat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000700), 0x0) clock_gettime(0x0, &(0x7f0000000d80)) stat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@remote, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xe8) getuid() geteuid() 22:02:21 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) futex(&(0x7f0000004000), 0x9, 0x2, &(0x7f0000001ff0), &(0x7f0000000180), 0xfffffffffffffffc) 22:02:22 executing program 4: set_robust_list(&(0x7f0000000380)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)}}, 0x18) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000005c0)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000600)) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000300)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000640)) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000500)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getrlimit(0x0, &(0x7f0000000140)) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000680)={'vcan0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f0000000840)) stat(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getpeername$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000480)=0x1c) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:02:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x11, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bridge0\x00', 0x0}) sendto$packet(r1, &(0x7f0000000100), 0x5e0, 0x0, &(0x7f00000001c0)={0x11, 0x8100, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) 22:02:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f0000000100)={0x14, 0x9, 0x6, 0x105}, 0x14}}, 0x0) 22:02:22 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000001400)='notify_on_release\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) syz_execute_func(&(0x7f0000000a00)="c482fdb63de1a200002969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e146210ca01b20da019a5c085c0864ac1e5d31a314b7f0e28a05987b7f") 22:02:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 22:02:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000409004bddd9a772556ad7057ca805a300b1fd63170100000010eeafda75af1f02ac06edbcd7a093fb35331ce39c5a00000000") fsetxattr(0xffffffffffffffff, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) setpriority(0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f0000000200)=""/11) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() getuid() getuid() fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) setresuid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") 22:02:23 executing program 5: mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000180)) select(0x40, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640), &(0x7f00000006c0)={0x0, 0x7530}) keyctl$set_reqkey_keyring(0x2, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/pid\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000780)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000700)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)='veth1_to_bridge\x00'}) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000000c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000003c0)) prctl$setendian(0x14, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000380)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0xfffffc30) clock_adjtime(0x0, &(0x7f00000004c0)) capset(&(0x7f0000000280), &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:02:23 executing program 1: ioprio_set$uid(0x0, 0x0, 0x2614) 22:02:23 executing program 0: r0 = socket(0x1e, 0x5, 0x0) close(r0) vmsplice(r0, &(0x7f0000002340), 0x0, 0x0) 22:02:23 executing program 4: epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d80), &(0x7f0000000dc0)=0xc) stat(&(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) stat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) getegid() sendmsg$unix(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000000500)=@abs, 0x6e, &(0x7f0000000cc0), 0x0, &(0x7f0000001000)}, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000240)=0xe8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000740)) socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0, 0x57, &(0x7f0000000500), &(0x7f0000000600)=""/87}, 0x28) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000004c0)) bind(0xffffffffffffffff, &(0x7f0000000400)=@in={0x2, 0x0, @remote}, 0x100000166) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000002c0)={0x0, @dev, 0x0, 0x0, 'wrr\x00'}, 0x2c) chroot(&(0x7f0000000580)='./file0\x00') getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000008c0)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000280)) setxattr$trusted_overlay_origin(&(0x7f0000000480)='./file0\x00', &(0x7f0000000700)='trusted.overlay.origin\x00', &(0x7f0000000780)='y\x00', 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x0, "2f9ddde6492eecd8"}) read(0xffffffffffffffff, &(0x7f0000000900)=""/210, 0xd2) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:02:23 executing program 1: syz_emit_ethernet(0x2c, &(0x7f0000000280)={@local, @local, [], {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@broadcast, @current}, {@broadcast, @random="cbe749897d69"}}}}}, &(0x7f0000000040)) syz_open_procfs$namespace(0x0, 0xffffffffffffffff) lstat(&(0x7f0000000240)='.\x00', &(0x7f0000000080)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000040)) pipe2(&(0x7f0000000080), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000004c0)="428055a047f20838976999b069773dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291ac462edae0d00000000c4e14b2a492d5224f04008346d0000000000753241801b00c48295be146aa03333420f70942777c402c58c1cbe00e306476bff745c1e1f7f") 22:02:23 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000340)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000080)='tunl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') 22:02:23 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={&(0x7f00000005c0)=@nl, 0x80, &(0x7f0000000040)=[{&(0x7f0000000240)="5500000018007fbdb72d23b2a4a280930a0600fec0a8431491000000040008001a000500fec000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000640)}, 0x0) [ 338.387625] netlink: 25 bytes leftover after parsing attributes in process `syz-executor0'. 22:02:23 executing program 2: statfs(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000cc0)=""/4096) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mlock2(&(0x7f00007e0000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 22:02:23 executing program 0: r0 = epoll_create1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = epoll_create1(0x0) r3 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000d36ff4)={0xfc147812c6696263}) timerfd_settime(r3, 0x1, &(0x7f0000005000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000af9ff0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000ca0000)={0x2001}) epoll_pwait(r2, &(0x7f0000a1efac)=[{}], 0x1, 0x0, &(0x7f0000bbfff8), 0x8) 22:02:23 executing program 1: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000580)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000780)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)='oom_adj\x00'}, 0x30) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) futex(&(0x7f0000000400), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000480)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000500)) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000340)={'ipvs\x00'}, &(0x7f00000003c0)=0x1e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)) 22:02:23 executing program 0: getrusage(0xfffffffffffffffc, &(0x7f0000000400)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)=""/245, &(0x7f00000008c0)=0xf5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) prctl$intptr(0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) pipe2(&(0x7f0000000380), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000480), 0xc, &(0x7f0000000780)={&(0x7f0000000900)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000500)=0x1e) epoll_create(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000a00)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efc461f877417545c46279db8e040000002e1a1a3ef0f6585501ee31a3b786e2980f73f0ecc4225992749f55") 22:02:24 executing program 3: clock_gettime(0xd9012b20d797d5a0, &(0x7f0000000300)) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) pipe(&(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@multicast2, @in6}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) umount2(&(0x7f0000000080)='./file0\x00', 0x0) set_robust_list(&(0x7f0000000380)={&(0x7f0000000240)={&(0x7f0000000200)}, 0x0, &(0x7f0000000340)={&(0x7f0000000280)}}, 0x18) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getpgrp(0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000440)={0x0, 'teql0\x00'}, 0x18) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{0x77359400}}, &(0x7f0000000680)) open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000002c0)={'NETMAP\x00'}, &(0x7f00000003c0)=0x1e) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000900)=""/137, &(0x7f0000000700)=0xfffffffffffffe03) seccomp(0x0, 0x0, &(0x7f0000000100)) 22:02:24 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='mqueue\x00', 0x5, &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0/bus\x00', 0x0) 22:02:24 executing program 5: epoll_create(0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000003c0)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000140)={0x12509e3bf4d420d4}, 0x7) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000300)) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) getuid() stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002800)={{{@in6=@mcast2, @in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002940), &(0x7f0000002980)=0xc) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002dc0), &(0x7f0000002e00)=0xc) getegid() lstat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) fstat(0xffffffffffffffff, &(0x7f0000002f00)) geteuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c740)={{{@in, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000079c0)=0x1000002c3) fstat(0xffffffffffffffff, &(0x7f0000003340)) lstat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003400)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003500), &(0x7f0000003540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000003580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003700)=0xe8) getresgid(&(0x7f0000003740), &(0x7f0000003780), &(0x7f00000037c0)) 22:02:24 executing program 2: prctl$intptr(0x1d, 0x15) prctl$void(0x0) request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080), &(0x7f00000000c0)='security,\x00', 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) pipe2(&(0x7f0000000200), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000140)) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000180), 0x4) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 22:02:24 executing program 4: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 22:02:24 executing program 1: keyctl$set_reqkey_keyring(0x2, 0x80000000000004) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000980)) fchownat(0xffffffffffffffff, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000a00)) socket$inet6_udp(0xa, 0x2, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6, @in=@local}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) getgid() keyctl$chown(0x4, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) prctl$setendian(0x14, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[], 0x0, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000080)) lseek(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0x50, &(0x7f0000000200)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000000c0), 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0x4) getrusage(0x0, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) nanosleep(&(0x7f0000000180)={0x77359400}, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0aa0fef69dc0f01eec4e10969ab9c2d0000c273fefefa380f387c366766400f5c61fe66420f7c9047000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179e56bc9f6411515bd09000000800f2ed9c4010d64ac1e5d31a3b744dbe271fb293e3636f7c02c33ffff") getuid() dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) 22:02:24 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x2a02, 0x0) close(r0) 22:02:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') pread64(r0, &(0x7f0000000080)=""/19, 0x13, 0x0) pread64(r0, &(0x7f0000000040)=""/12, 0xc, 0x6) 22:02:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/62) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 22:02:25 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000740)}}], 0x1, 0x0, &(0x7f0000003280)) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 22:02:25 executing program 5: munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000600), 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000640)={{0x0, @broadcast, 0x0, 0x0, 'lblcr\x00'}, {@broadcast}}, 0x44) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000340)=@raw, &(0x7f0000000480)='syzkaller\x00'}, 0x48) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff86, &(0x7f0000000d40)}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfce2, &(0x7f0000000d00)='eth0proc/system!\\)\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffff9c, 0x50, &(0x7f0000000700)}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000b00)='./file0\x00', 0x0, 0x0) getpgid(0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffff9c, 0x50, &(0x7f0000000b40)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000040)=':bdev\\\x00'}, 0x14e) getpid() timer_create(0x0, &(0x7f0000000240), &(0x7f00000001c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@loopback}}, 0xe8) timer_gettime(0x0, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000680), &(0x7f0000000780)}}, &(0x7f0000000580)) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f0000000940), &(0x7f0000000140)) munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000180)={0x27}, 0xffffffffffffffb1) write$tun(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000a80)="42805da0bd0fef69dc0f01eece73fe19faa30738211af3f0817e768cc80000000081b5e5bc2b00000021c461fa708481ea0000001c6b2179dae5e541cccc450f512e1a1a010d64ac1e5d31a3b74472e671fb0703") socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000cc0)=0xfffffff8) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000140)=0xc) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) timerfd_create(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd(0xffffffffffffff9c, &(0x7f0000000000), 0x8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@remote}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={@loopback, @mcast1, @local}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) 22:02:25 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000009d00)={&(0x7f0000000000), 0xc, &(0x7f0000009cc0)={&(0x7f0000000780)=@getlink={0x28, 0x12, 0xd01, 0x0, 0x0, {}, [@IFLA_IF_NETNSID={0x8}]}, 0x28}}, 0x0) 22:02:26 executing program 3: pipe(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x0, @multicast1, 0x0, 0x0, 'lc\x00'}, 0x2c) 22:02:26 executing program 4: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000680)}) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000840), 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000880)='/dev/loop-control\x00', 0x0, 0x0) memfd_create(&(0x7f0000000a40)='\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a80)) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000026c0)='system.posix_acl_default\x00', &(0x7f0000000540)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:02:26 executing program 1: pipe2(&(0x7f0000000040), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000000c0), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000140)) close(0xffffffffffffffff) timerfd_create(0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:02:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) io_setup(0x0, &(0x7f0000000000)) r1 = getpid() getpeername$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000240)=0x1c) sched_setscheduler(r1, 0x5, &(0x7f0000000100)) shutdown(r0, 0x0) 22:02:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) dup3(r2, r0, 0x0) 22:02:26 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 22:02:26 executing program 4: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000140)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000200), 0x0) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)) 22:02:26 executing program 5: mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040), 0x0, &(0x7f00000000c0), &(0x7f0000000200), 0x8) 22:02:26 executing program 5: mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) memfd_create(&(0x7f0000000380)="6b657972696e6776626f786e6574306426236b657972696e67657403000000000000002e423dae1f21bb0a712525ce99ae031ae9a5b961a0bf6ae0d51d150a5bb71b30364fba636644f69563f5c2000000000000", 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4f, &(0x7f0000000080)="6b657972696e6776626f786e6574306426236b657972696e67657403000000000000002e423dae1f21bb0a712525ce99ae031ae9a5b961a0bf6ae0d51d150a5bb71b30364fba636644f69563f5c200", 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) execve(&(0x7f0000000240)='./file0\x00', &(0x7f0000000500), &(0x7f0000000840)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58feb}]}) syz_execute_func(&(0x7f0000000680)="428055a03b1a1a69ef69dc00d9fbf3440f6f50e2692037370dc305bd060f38015d40a564a70f157a9e400f01efe5e5a2fd45c962050906002e660fe095000000003ef0f6585501410fa931a3b786e298dd3f227992dd289f410f0f8084170000ae") 22:02:26 executing program 0: mknod$loop(&(0x7f0000000900)='./file1\x00', 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:27 executing program 4: getpid() getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:02:27 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000140)='oom_adj\x00', 0xffffffffffffffff}, 0x30) gettid() getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280)) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) pipe2(&(0x7f00000002c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:02:27 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000100)={0x0, 0x0, 0x17}) 22:02:27 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) 22:02:27 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x0) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 22:02:27 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a06000000a84306910000002600070035000c00060000001900150005000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 22:02:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r1, 0x16) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x0) 22:02:27 executing program 0: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) prlimit64(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)) 22:02:27 executing program 4: getresgid(&(0x7f0000000080), &(0x7f0000000180), &(0x7f00000001c0)) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000500)) syslog(0x0, &(0x7f00000007c0)=""/83, 0x3d) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) setuid(0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 22:02:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'rose0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 22:02:27 executing program 3: seccomp(0xfffffffffffffffc, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000004c0)}) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) keyctl$set_reqkey_keyring(0xb, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000140)) clock_settime(0x0, &(0x7f0000000440)={0x0, 0x989680}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:27 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000f40)={'ip6tnl0\x00', {0x2, 0x0, @local}}) 22:02:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendto$packet(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 22:02:28 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x9) sendmsg(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="240000005e0007031dfffd946fa2830020200a0009000304341d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 343.362686] selinux_nlmsg_perm: 265 callbacks suppressed [ 343.362696] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=94 sclass=netlink_audit_socket pig=19840 comm=syz-executor0 22:02:28 executing program 0: keyctl$set_reqkey_keyring(0x2, 0x0) clock_gettime(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000080)='}userloem0!,\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") [ 343.418461] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=94 sclass=netlink_audit_socket pig=19840 comm=syz-executor0 22:02:28 executing program 1: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000400)={'raw\x00'}, &(0x7f0000000480)=0x54) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=ANY=[], &(0x7f00000002c0)=""/148, 0x94) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="42805da0bd0fef69dc0f01eece73fe19fac461796e04df3821436cf0817e768cc80000000081b5e5bc2b0000002167f01fbab233000002ca6b21790e25e5e44135c4e229980557000000c4010d64ac1e5d31a3b74472e671fb0703") 22:02:28 executing program 5: fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") 22:02:28 executing program 4: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000a0a07031dfffd946fa2830020200a0009004ef2021d85680c1baba20400ff7e28000000110affffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 344.176153] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2570 sclass=netlink_tcpdiag_socket pig=19864 comm=syz-executor4 22:02:31 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @link_local={0x1, 0x80, 0xc2, 0xe80}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x4, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 22:02:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x2) io_setup(0x1, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000100)='R', 0x1}]) 22:02:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="000000000000000008001b0000000000"], 0x1}}, 0x0) 22:02:31 executing program 1: keyctl$setperm(0x14, 0x0, 0x0) getpid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000a40)) bind$inet(0xffffffffffffffff, &(0x7f00000006c0)={0x2, 0x0, @dev}, 0xfffffffffffffef1) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) lseek(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@broadcast, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) getgid() socket$nl_xfrm(0x10, 0x3, 0x6) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="42805da0a95dde0f3a6086a3088041cb913591913d0629007899442a417934c8c8eefa6466410f51cc302fd0d0451f2e1a3828c40379dfb8d6adbe90dfe29f7f") 22:02:31 executing program 5: getpid() syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_flowlabel\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)={0x77359400}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @loopback}, {0x0, @broadcast}, 0x0, {}, 'veth1_to_team\x00'}) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000000200)='net/ip6_flowlabel\x00', 0xffffffffffffffff) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) add_key(&(0x7f0000000500)='.dead\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffe) getresuid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000008c0), &(0x7f0000000900)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000940)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@local, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000b00)) fcntl$getown(0xffffffffffffffff, 0x9) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000d80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000ec0)=0xe8) getresgid(&(0x7f0000000f00), &(0x7f0000000f40), &(0x7f0000000f80)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000fc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000001700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001740), &(0x7f0000001780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in6, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000018c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001980), &(0x7f00000019c0)=0xc) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a00)={{{@in=@broadcast, @in6=@dev}}, {{@in=@remote}}}, &(0x7f0000001b00)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000001c40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) stat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) getgroups(0x0, &(0x7f0000002440)) getresuid(&(0x7f00000024c0), &(0x7f0000002500), &(0x7f0000002540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 22:02:31 executing program 4: perf_event_open(&(0x7f0000c86f88)={0x2, 0x232, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000000540)) 22:02:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0'}, 0xb) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x8080201}, 0xc) 22:02:31 executing program 4: clock_gettime(0x1, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000140)=@req) readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') request_key(&(0x7f00000004c0)='logon\x00', &(0x7f0000000500), &(0x7f0000000540)='IPVS\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000340)='/dev/rtc0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0x2, &(0x7f0000000400)={&(0x7f0000000600)=ANY=[]}}, 0x0) pselect6(0x40, &(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000001680)={0x77359400}, &(0x7f0000001700)={&(0x7f00000016c0), 0x8}) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) clock_nanosleep(0x0, 0x0, &(0x7f0000001640)={0x0, 0x989680}, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:31 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) poll(&(0x7f0000001a40)=[{r0}], 0x1, 0x0) 22:02:31 executing program 0: pipe2(&(0x7f0000000000), 0x0) clone(0x100103, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x80000000000005, &(0x7f00000006c0)) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000280)=0x1e) 22:02:31 executing program 3: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) keyctl$set_reqkey_keyring(0x4, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x4) gettid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 22:02:32 executing program 4: unshare(0x20400) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sctp\x00') fcntl$notify(r0, 0x402, 0x0) 22:02:32 executing program 4: clock_gettime(0xfffffffffffffffd, &(0x7f0000000400)) pipe(&(0x7f0000000180)) execveat(0xffffffffffffffff, &(0x7f0000000500)='./file0\x00', &(0x7f0000000fc0), &(0x7f0000001180), 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") memfd_create(&(0x7f0000000680)="000000006c6144c160b420e8ddfe665b6b0a9704d5cd329f16e948c2476227c41cbcbe2218e4baf415887eb517765745243ec67536b729fddf6daba8bc9e8e5a5c2ee49f2a106c67c7b41ab9a690d018000000004e9ec879288872efc6a74d4efbbdd2423996448212ea75bc37adbec716579606e0b8d9b2fe431028692ddca62358b190460eecb18aae010755918dfe8fb18c19cc1941f8c5df42ac73c995367cae7aa6d55c25e3e2dbc01e80d28453", 0x0) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 22:02:32 executing program 2: pselect6(0x40, &(0x7f0000000200), &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000740), &(0x7f0000000780)={0x0}) setrlimit(0x0, &(0x7f0000000040)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 22:02:32 executing program 5: eventfd(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], &(0x7f0000000580)=""/178, 0xb2) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000400), 0x0) clock_gettime(0x0, &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)={&(0x7f0000000580)='./file1\x00'}, 0xfffffffffffffe25) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000380)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000040)) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) geteuid() getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000400)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000003c0)="6c00ffff00") pipe(&(0x7f00000006c0)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 22:02:32 executing program 1: munlockall() openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000080)) timerfd_create(0x0, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000640), 0xf93c6d5eb1c633a5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000140)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in, @in6}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@multicast1, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, 0xe8) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@remote, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000300)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, &(0x7f00001fefe4), 0x1c) syz_execute_func(&(0x7f0000000580)="42805da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000200)={@loopback, @empty, @mcast1}) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000280)) setitimer(0x3, &(0x7f0000000180)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000500)) 22:02:32 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) 22:02:32 executing program 4: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 22:02:32 executing program 5: r0 = socket$inet6(0xa, 0x100000003, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@loopback, @remote, @mcast1, 0x0, 0xfffffffffffffffa, 0x7}) 22:02:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) chdir(&(0x7f0000000780)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) 22:02:33 executing program 5: setrlimit(0x0, &(0x7f0000000040)) truncate(&(0x7f0000000580)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20fb9441000660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:02:33 executing program 0: lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000bc0)) clock_settime(0x0, &(0x7f0000000040)={0x77359400}) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000700)='pkcs7_test\x00', &(0x7f0000000840), &(0x7f0000000880)='gretap0\x00', 0xfffffffffffffffa) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000e00), 0x0, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0), &(0x7f0000000500), 0x0, 0xfffffffffffffff8) keyctl$join(0x1, &(0x7f0000000b80)) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 22:02:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[], 0x0) 22:02:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000180), 0xe2) 22:02:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000180)="0401000000c000ddb8460900ffb25b4202938207d9fb3780398d5375c5f73f939029298d7535352cd5a1f57590080053c0e385472da738a59a3c033b970720a42f2a2bb404e158ccdb0ac538d24c10d6afcc2f2dbd96c3b50000290f518d0000f55d4626019c30519b3b6322", 0x6c, 0x0, &(0x7f0000000000)={0xa, 0x200000800, 0x20400000005}, 0x1c) 22:02:34 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f00000000c0)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000000)) close(r1) 22:02:34 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) ioctl$TUNSETPERSIST(r0, 0x8927, 0x70e000) 22:02:34 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) nanosleep(&(0x7f0000000200)={0x0, r1+10000000}, &(0x7f0000000240)) tkill(0x0, 0x0) tkill(r0, 0x1000000000016) 22:02:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000000)={'ip6tnl0\x00', @ifru_ivalue=0x70d000}) 22:02:34 executing program 3: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040), 0x4) prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) pipe2(&(0x7f00000003c0), 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000140)) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 22:02:34 executing program 5: readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)=""/4096, 0x1000) pipe2(&(0x7f00000003c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080), 0xc, &(0x7f0000000400)={&(0x7f0000001640)=ANY=[]}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/stat\x00') getdents64(0xffffffffffffffff, &(0x7f0000000000)=""/48, 0x337) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03f6969ef69dc00d9fbfb69203737c3397c05c4c23d017bffc443f949260064a70f157a9e400f01efe5e5417545c462010d4200676466f2440f7d213ef0f6585501ee31a3b786e29885c4227992dd289f") 22:02:34 executing program 1: clock_nanosleep(0x0, 0x1, &(0x7f00000008c0)={0x0, 0x1c9c380}, &(0x7f0000000900)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") rt_sigpending(&(0x7f00000001c0), 0x8) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 22:02:34 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x20400) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 22:02:34 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f00000003c0)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r1, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) 22:02:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0xfffffffffffffdc3, 0x5a6d8d97750cae5e) connect$unix(r1, &(0x7f0000000040)=@abs, 0x6e) 22:02:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000091dff8), &(0x7f0000000040)='./file0\x00', &(0x7f0000fb5ffc)='9p\x00', 0x0, &(0x7f000000a000)) 22:02:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 22:02:34 executing program 2: mkdir(&(0x7f0000000200)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f00000000c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x2) renameat2(r0, &(0x7f0000000280)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", r0, &(0x7f0000000300)='./file0\x00', 0x2) 22:02:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x61) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f00000001c0)) 22:02:34 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@nl=@kern={0x10, 0x600}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007f5300fe01b2a4a280930a060b0000a84306910000003900090035000c00060000001900150002000000000000dc1338d54400009b84136ef75afb83de4411001600c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000000400)}, 0x0) 22:02:34 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000001400)) 22:02:35 executing program 3: unshare(0x20400) r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000000)={{}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) 22:02:35 executing program 4: unshare(0x20400) r0 = open(&(0x7f00000003c0)='./bus\x00', 0x2141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) write$P9_RGETATTR(r0, &(0x7f00000001c0)={0xa0}, 0xa0) 22:02:35 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000040)="153f6234488dd25d766070") r1 = socket$inet(0x10, 0x3, 0x0) dup3(r0, r1, 0x0) 22:02:35 executing program 5: personality(0x4000008) uname(&(0x7f0000000800)=""/176) 22:02:35 executing program 5: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000001c0)) 22:02:35 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x2e40c0, 0x0) fcntl$setflags(r0, 0x2, 0x0) 22:02:35 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 22:02:35 executing program 5: socket$inet6(0xa, 0x100004, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0be0fef699c0f01fecfc4e161763fd69d0fe00ff01af3f0817e768cc80000000081b5e5bc2b0000002167660f382a6b00641c7366776643d5c7a169e985fe5e000075450f2e1ac4010d64ac1e5d31a3b744dbe2c4a1c95fbf9222a25c0703") 22:02:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x39, &(0x7f00000003c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) 22:02:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000003b00)={&(0x7f0000000880)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_VF_PORTS={0x4}]}, 0x2c}}, 0x0) 22:02:35 executing program 4: sync() openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 22:02:35 executing program 1: clock_settime(0x0, &(0x7f0000000600)={0x0, 0x989680}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000040)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 22:02:35 executing program 3: getpid() getresgid(&(0x7f0000000380), &(0x7f0000000440), &(0x7f0000000480)) getegid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) getgid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) fstat(0xffffffffffffffff, &(0x7f00000006c0)) fstat(0xffffffffffffff9c, &(0x7f0000000740)) stat(&(0x7f00000007c0)='./file0/file0\x00', &(0x7f0000000800)) getgroups(0x0, &(0x7f0000000880)) lstat(&(0x7f0000000240)='.\x00', &(0x7f0000000080)) unlink(&(0x7f0000000180)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) geteuid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000003c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) memfd_create(&(0x7f00000001c0)='@\x00', 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000200)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) getgid() getgroups(0x0, &(0x7f0000000200)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040), 0x4) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000001600)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000400)='@\x00'}, 0x30) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 350.529566] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 22:02:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x80000000000041, &(0x7f0000000240)="261140cb96a2cf887028a2d87b7d9d5109900de8d9344fe3ab3c60427e039a9791fbcc7d9536ea16d7", 0x29) [ 350.616206] ================================================================== [ 350.623695] BUG: KASAN: stack-out-of-bounds in strlcpy+0x101/0x120 [ 350.630035] Read of size 1 at addr ffff8801d5247b0c by task syz-executor0/20087 [ 350.637946] [ 350.639579] CPU: 1 PID: 20087 Comm: syz-executor0 Not tainted 4.9.127+ #43 [ 350.646979] ffff8801d52479e8 ffffffff81af11e9 ffffea00075491c0 ffff8801d5247b0c [ 350.655106] 0000000000000000 ffff8801d5247b0c 0000000000000005 ffff8801d5247a20 [ 350.663284] ffffffff814e13fd ffff8801d5247b0c 0000000000000001 0000000000000000 [ 350.671457] Call Trace: [ 350.674076] [] dump_stack+0xc1/0x128 [ 350.679438] [] print_address_description+0x6c/0x234 [ 350.686102] [] kasan_report.cold.6+0x242/0x2fe [ 350.692349] [] ? strlcpy+0x101/0x120 [ 350.697727] [] __asan_report_load1_noabort+0x14/0x20 [ 350.704993] [] strlcpy+0x101/0x120 [ 350.710202] [] xt_copy_counters_from_user+0x152/0x300 [ 350.721184] [] ? xt_hook_ops_alloc+0x270/0x270 [ 350.728181] [] ? mutex_lock_nested+0x650/0x870 [ 350.734421] [] do_add_counters+0x96/0x5c0 [ 350.740246] [] ? __do_replace+0x630/0x630 [ 350.746086] [] ? security_capable+0x94/0xc0 [ 350.752086] [] ? ns_capable_common+0x12a/0x150 [ 350.763432] [] compat_do_ip6t_set_ctl+0xd6/0x140 [ 350.769866] [] compat_nf_setsockopt+0x8b/0x130 [ 350.776120] [] ? compat_do_replace.isra.10+0x380/0x380 [ 350.783070] [] compat_ipv6_setsockopt+0x15d/0x1d0 [ 350.789604] [] inet_csk_compat_setsockopt+0x97/0x120 [ 350.796392] [] ? ipv6_setsockopt+0x130/0x130 [ 350.802471] [] compat_tcp_setsockopt+0x3d/0x70 [ 350.808724] [] compat_sock_common_setsockopt+0xb4/0x150 [ 350.815774] [] ? do_tcp_setsockopt.isra.5+0x1ca0/0x1ca0 [ 350.824973] [] compat_SyS_setsockopt+0x169/0x540 [ 350.834267] [] ? sock_common_setsockopt+0xe0/0xe0 [ 350.840767] [] ? scm_detach_fds_compat+0x3b0/0x3b0 [ 350.847788] [] ? kcov_ioctl+0x56/0x1c0 [ 350.853364] [] ? move_addr_to_kernel+0x50/0x50 [ 350.859651] [] ? do_fast_syscall_32+0xcf/0x860 [ 350.865921] [] ? scm_detach_fds_compat+0x3b0/0x3b0 [ 350.872529] [] do_fast_syscall_32+0x2f1/0x860 [ 350.878687] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.885357] [] entry_SYSENTER_compat+0x90/0xa2 [ 350.891578] [ 350.893238] The buggy address belongs to the page: [ 350.898180] page:ffffea00075491c0 count:0 mapcount:0 mapping: (null) index:0x0 [ 350.906522] flags: 0x4000000000000000() [ 350.910542] page dumped because: kasan: bad access detected [ 350.916254] [ 350.917873] Memory state around the buggy address: [ 350.922797] ffff8801d5247a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 350.930181] ffff8801d5247a80: 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 [ 350.938004] >ffff8801d5247b00: 00 04 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 [ 350.945396] ^ [ 350.949045] ffff8801d5247b80: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 [ 350.959242] ffff8801d5247c00: 00 00 00 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 [ 350.968653] ================================================================== [ 350.976005] Disabling lock debugging due to kernel taint 22:02:35 executing program 5: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) gettid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) getsockname(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000600)=0x14) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000003c0), 0xc, &(0x7f0000000640)={&(0x7f0000000cc0)=ANY=[]}}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/full\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000740)) getegid() getresgid(&(0x7f0000000180), &(0x7f0000000240), &(0x7f0000000440)) getegid() ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) getresgid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) getegid() getgid() ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000700)) sched_getscheduler(0x0) getgroups(0x0, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 22:02:36 executing program 1: r0 = socket$inet6(0xa, 0x100000003, 0x3a) sendto$inet6(r0, &(0x7f0000000000), 0xfffffffffffffd66, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 22:02:36 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000400), 0x0, &(0x7f00000018c0)}, 0x0) 22:02:36 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4000100000008912, &(0x7f0000000280)="88f96234488dd25d766070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000480)={0x20071026}, &(0x7f00000004c0)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='gretap0\x00'}) [ 351.426018] Kernel panic - not syncing: panic_on_warn set ... [ 351.426018] [ 351.433459] CPU: 1 PID: 20087 Comm: syz-executor0 Tainted: G B 4.9.127+ #43 [ 351.443201] ffff8801d5247948 ffffffff81af11e9 ffffffff82c347e0 00000000ffffffff [ 351.451274] 0000000000000000 0000000000000001 0000000000000005 ffff8801d5247a08 [ 351.460857] ffffffff813df675 0000000041b58ab3 ffffffff82c287e3 ffffffff813df4b6 [ 351.468907] Call Trace: [ 351.472386] [] dump_stack+0xc1/0x128 [ 351.477763] [] panic+0x1bf/0x39f [ 351.482780] [] ? add_taint.cold.6+0x16/0x16 [ 351.489518] [] ? ___preempt_schedule+0x16/0x18 [ 351.495762] [] kasan_end_report+0x47/0x4f [ 351.501565] [] kasan_report.cold.6+0x76/0x2fe [ 351.517096] [] ? strlcpy+0x101/0x120 [ 351.522468] [] __asan_report_load1_noabort+0x14/0x20 [ 351.529225] [] strlcpy+0x101/0x120 [ 351.534874] [] xt_copy_counters_from_user+0x152/0x300 [ 351.541719] [] ? xt_hook_ops_alloc+0x270/0x270 [ 351.547951] [] ? mutex_lock_nested+0x650/0x870 [ 351.554208] [] do_add_counters+0x96/0x5c0 [ 351.560005] [] ? __do_replace+0x630/0x630 [ 351.565810] [] ? security_capable+0x94/0xc0 [ 351.571792] [] ? ns_capable_common+0x12a/0x150 [ 351.578024] [] compat_do_ip6t_set_ctl+0xd6/0x140 [ 351.584435] [] compat_nf_setsockopt+0x8b/0x130 [ 351.591099] [] ? compat_do_replace.isra.10+0x380/0x380 [ 351.598030] [] compat_ipv6_setsockopt+0x15d/0x1d0 [ 351.609309] [] inet_csk_compat_setsockopt+0x97/0x120 [ 351.616076] [] ? ipv6_setsockopt+0x130/0x130 [ 351.622147] [] compat_tcp_setsockopt+0x3d/0x70 [ 351.628388] [] compat_sock_common_setsockopt+0xb4/0x150 [ 351.635401] [] ? do_tcp_setsockopt.isra.5+0x1ca0/0x1ca0 [ 351.642422] [] compat_SyS_setsockopt+0x169/0x540 [ 351.648829] [] ? sock_common_setsockopt+0xe0/0xe0 [ 351.655679] [] ? scm_detach_fds_compat+0x3b0/0x3b0 [ 351.662262] [] ? kcov_ioctl+0x56/0x1c0 [ 351.668105] [] ? move_addr_to_kernel+0x50/0x50 [ 351.674342] [] ? do_fast_syscall_32+0xcf/0x860 [ 351.681038] [] ? scm_detach_fds_compat+0x3b0/0x3b0 [ 351.687613] [] do_fast_syscall_32+0x2f1/0x860 [ 351.693756] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.700417] [] entry_SYSENTER_compat+0x90/0xa2 [ 351.707454] Kernel Offset: disabled [ 351.711114] Rebooting in 86400 seconds..