b6de74eaba64be114d1b89d5178677425a30216a4e42beebc3e9a5edd20659852d48ebc0f2ab1c41168d013242fc6788ea33bbb4baa9bd49ada32e81c52310ae179", 0x1000, 0x6033, 0x0, 0x3, r4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x3, r3, &(0x7f00000003c0)="630ffd56842f731ce28eca03bb751839aac0d41a915bce9487c29486e562c1d31e0a173e0da765572c153e9a3e297368f4730cf28ada5d723e0f429ff338ebeb940c37584a4e1a7cfdb5db713fe534524e9e1e2721eced3cad709e453e2b5ed06cd1746cb73c97e53887c42546cd9419796570fac70f5b0ba4421d8658332f", 0x7f, 0x9, 0x0, 0x3, r3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x2, r5, &(0x7f0000000480)="daed5fb648ed039172147ecdc7e6f643a3b6b35844c0773a6a8f562c3a15eacb6e637dade5723adf42f2243be09d7382713eaf992c41ba799a90e3c3004626fecb2781f4dca7a0f62c2d45f859ab565e472dd4d0a3913bf85eb5c639", 0x5c, 0x8, 0x0, 0x1, r6}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xd, 0x8001, r7, &(0x7f0000000540), 0x0, 0x5, 0x0, 0x3, r3}]) r8 = inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) inotify_rm_watch(r3, r8) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:21 executing program 3: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) 01:36:21 executing program 1: unshare(0x2c020400) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000040)=@srh={0x6, 0x4, 0x4, 0x2, 0x20, 0x0, 0x4, [@rand_addr=' \x01\x00', @local]}, 0x28) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000080)={0x2d, 0x2, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @ra={0x5, 0x2, 0x4286}]}, 0x20) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) 01:36:21 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r2, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) r7 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r7, 0x0, 0x0) io_submit(0x0, 0x6, &(0x7f00000005c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0xf658, 0xffffffffffffffff, &(0x7f0000000140)="41c25025b5c5432d9578eddfb653ea49df0972d1396a2281c3c8c2b9adaa457caf91b2a4870872636850c14e6a9b36be26a74497141e8ad5ece0d582f3b2ad5f6b65fabeac25f1e32a8cba589012ffb58ef44ac5dcf28a11ec5964df2103a0873a47995463e0b5e4b0132f8f243f9485b92cffff", 0x74, 0x10000, 0x0, 0x3, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="515c13df64c59cb2ff44dad42cde1a577171f4d481075d05f795143c3a27244998d5cc91665b85ac22f1429359f9dc", 0x2f, 0xbc9a, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8000, r0, &(0x7f0000000cc0)="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", 0x1000, 0x6033, 0x0, 0x3, r4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x3, r3, &(0x7f00000003c0)="630ffd56842f731ce28eca03bb751839aac0d41a915bce9487c29486e562c1d31e0a173e0da765572c153e9a3e297368f4730cf28ada5d723e0f429ff338ebeb940c37584a4e1a7cfdb5db713fe534524e9e1e2721eced3cad709e453e2b5ed06cd1746cb73c97e53887c42546cd9419796570fac70f5b0ba4421d8658332f", 0x7f, 0x9, 0x0, 0x3, r3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x2, r5, &(0x7f0000000480)="daed5fb648ed039172147ecdc7e6f643a3b6b35844c0773a6a8f562c3a15eacb6e637dade5723adf42f2243be09d7382713eaf992c41ba799a90e3c3004626fecb2781f4dca7a0f62c2d45f859ab565e472dd4d0a3913bf85eb5c639", 0x5c, 0x8, 0x0, 0x1, r6}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xd, 0x8001, r7, &(0x7f0000000540), 0x0, 0x5, 0x0, 0x3, r3}]) r8 = inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) inotify_rm_watch(r3, r8) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:21 executing program 1: getpid() r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f00000002c0)=0x8) unshare(0x2c020400) prctl$PR_CAPBSET_READ(0x17, 0x9) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000040)=""/222) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000001c0)=""/148) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x5ed, 0x30000) r2 = syz_open_dev$rtc(&(0x7f0000000280), 0x1000, 0x100) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000180)) 01:36:21 executing program 3: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) 01:36:21 executing program 0: unshare(0x2c020400) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 01:36:21 executing program 4: r0 = msgget$private(0x0, 0x29e) unshare(0x2c020400) unshare(0x60100) msgctl$IPC_STAT(r0, 0xb, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x12480, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r1, 0x29, 0x37, &(0x7f0000000040)={0xc, 0x16, '\x00', [@generic={0x1, 0xb0, "cadce73fc958385f55181e86232e34a6c07603ebb8222efa283b760a38302380592468b2532dc0829abaa161323ba6a805920575f4f62cc61cad2be1cddd5b4b939400a427e98c1e63fb6111f0d0d65ecf424750fabf2a35f61a199399666b56896145cae8f00babe5a91fb802ddfd1b6220347bdc03483fc08037c35e5e385614c5212a05430308b4c2db9a031264f9f2a5adbf2fa21bfd28f4e07df22e8a15b8ef3c9e282688eeff26bd78de83fd75"}, @ra={0x5, 0x2, 0x5}]}, 0xc0) unshare(0x80) 01:36:21 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) io_submit(0x0, 0x6, &(0x7f00000005c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0xf658, 0xffffffffffffffff, &(0x7f0000000140)="41c25025b5c5432d9578eddfb653ea49df0972d1396a2281c3c8c2b9adaa457caf91b2a4870872636850c14e6a9b36be26a74497141e8ad5ece0d582f3b2ad5f6b65fabeac25f1e32a8cba589012ffb58ef44ac5dcf28a11ec5964df2103a0873a47995463e0b5e4b0132f8f243f9485b92cffff", 0x74, 0x10000, 0x0, 0x3, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="515c13df64c59cb2ff44dad42cde1a577171f4d481075d05f795143c3a27244998d5cc91665b85ac22f1429359f9dc", 0x2f, 0xbc9a, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8000, r0, &(0x7f0000000cc0)="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", 0x1000, 0x6033, 0x0, 0x3, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x3, r2, &(0x7f00000003c0)="630ffd56842f731ce28eca03bb751839aac0d41a915bce9487c29486e562c1d31e0a173e0da765572c153e9a3e297368f4730cf28ada5d723e0f429ff338ebeb940c37584a4e1a7cfdb5db713fe534524e9e1e2721eced3cad709e453e2b5ed06cd1746cb73c97e53887c42546cd9419796570fac70f5b0ba4421d8658332f", 0x7f, 0x9, 0x0, 0x3, r2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x2, r4, &(0x7f0000000480)="daed5fb648ed039172147ecdc7e6f643a3b6b35844c0773a6a8f562c3a15eacb6e637dade5723adf42f2243be09d7382713eaf992c41ba799a90e3c3004626fecb2781f4dca7a0f62c2d45f859ab565e472dd4d0a3913bf85eb5c639", 0x5c, 0x8, 0x0, 0x1, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xd, 0x8001, r6, &(0x7f0000000540), 0x0, 0x5, 0x0, 0x3, r2}]) r7 = inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) inotify_rm_watch(r2, r7) 01:36:21 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r2, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) r7 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r7, 0x0, 0x0) io_submit(0x0, 0x6, &(0x7f00000005c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0xf658, 0xffffffffffffffff, &(0x7f0000000140)="41c25025b5c5432d9578eddfb653ea49df0972d1396a2281c3c8c2b9adaa457caf91b2a4870872636850c14e6a9b36be26a74497141e8ad5ece0d582f3b2ad5f6b65fabeac25f1e32a8cba589012ffb58ef44ac5dcf28a11ec5964df2103a0873a47995463e0b5e4b0132f8f243f9485b92cffff", 0x74, 0x10000, 0x0, 0x3, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="515c13df64c59cb2ff44dad42cde1a577171f4d481075d05f795143c3a27244998d5cc91665b85ac22f1429359f9dc", 0x2f, 0xbc9a, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8000, r0, &(0x7f0000000cc0)="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", 0x1000, 0x6033, 0x0, 0x3, r4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x3, r3, &(0x7f00000003c0)="630ffd56842f731ce28eca03bb751839aac0d41a915bce9487c29486e562c1d31e0a173e0da765572c153e9a3e297368f4730cf28ada5d723e0f429ff338ebeb940c37584a4e1a7cfdb5db713fe534524e9e1e2721eced3cad709e453e2b5ed06cd1746cb73c97e53887c42546cd9419796570fac70f5b0ba4421d8658332f", 0x7f, 0x9, 0x0, 0x3, r3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x2, r5, &(0x7f0000000480)="daed5fb648ed039172147ecdc7e6f643a3b6b35844c0773a6a8f562c3a15eacb6e637dade5723adf42f2243be09d7382713eaf992c41ba799a90e3c3004626fecb2781f4dca7a0f62c2d45f859ab565e472dd4d0a3913bf85eb5c639", 0x5c, 0x8, 0x0, 0x1, r6}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xd, 0x8001, r7, &(0x7f0000000540), 0x0, 0x5, 0x0, 0x3, r3}]) r8 = inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) inotify_rm_watch(r3, r8) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:21 executing program 3: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) 01:36:21 executing program 0: unshare(0x2c020400) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 01:36:21 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/block', 0x2240, 0x130) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x24, 0x9, 0x5, 0x2, 0x7, 0x86, 0x1, 0x6b, 0x1}}) 01:36:21 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x48021000) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) r3 = msgget$private(0x0, 0x40) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000240)=""/4) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/142) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) msgget(0x3, 0x80) unshare(0x4028000) 01:36:21 executing program 0: unshare(0x2c020400) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) 01:36:21 executing program 1: ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x1, 0x1, {0x38, 0x1b, 0x14, 0xd, 0x0, 0xd44, 0x2, 0x8f, 0xffffffffffffffff}}) unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:21 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) r1 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) 01:36:21 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) io_submit(0x0, 0x6, &(0x7f00000005c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0xf658, 0xffffffffffffffff, &(0x7f0000000140)="41c25025b5c5432d9578eddfb653ea49df0972d1396a2281c3c8c2b9adaa457caf91b2a4870872636850c14e6a9b36be26a74497141e8ad5ece0d582f3b2ad5f6b65fabeac25f1e32a8cba589012ffb58ef44ac5dcf28a11ec5964df2103a0873a47995463e0b5e4b0132f8f243f9485b92cffff", 0x74, 0x10000, 0x0, 0x3, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="515c13df64c59cb2ff44dad42cde1a577171f4d481075d05f795143c3a27244998d5cc91665b85ac22f1429359f9dc", 0x2f, 0xbc9a, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8000, r0, &(0x7f0000000cc0)="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", 0x1000, 0x6033, 0x0, 0x3, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x3, r2, &(0x7f00000003c0)="630ffd56842f731ce28eca03bb751839aac0d41a915bce9487c29486e562c1d31e0a173e0da765572c153e9a3e297368f4730cf28ada5d723e0f429ff338ebeb940c37584a4e1a7cfdb5db713fe534524e9e1e2721eced3cad709e453e2b5ed06cd1746cb73c97e53887c42546cd9419796570fac70f5b0ba4421d8658332f", 0x7f, 0x9, 0x0, 0x3, r2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x2, r4, &(0x7f0000000480)="daed5fb648ed039172147ecdc7e6f643a3b6b35844c0773a6a8f562c3a15eacb6e637dade5723adf42f2243be09d7382713eaf992c41ba799a90e3c3004626fecb2781f4dca7a0f62c2d45f859ab565e472dd4d0a3913bf85eb5c639", 0x5c, 0x8, 0x0, 0x1, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xd, 0x8001, r6, &(0x7f0000000540), 0x0, 0x5, 0x0, 0x3, r2}]) r7 = inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) inotify_rm_watch(r2, r7) 01:36:21 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) io_submit(0x0, 0x6, &(0x7f00000005c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0xf658, 0xffffffffffffffff, &(0x7f0000000140)="41c25025b5c5432d9578eddfb653ea49df0972d1396a2281c3c8c2b9adaa457caf91b2a4870872636850c14e6a9b36be26a74497141e8ad5ece0d582f3b2ad5f6b65fabeac25f1e32a8cba589012ffb58ef44ac5dcf28a11ec5964df2103a0873a47995463e0b5e4b0132f8f243f9485b92cffff", 0x74, 0x10000, 0x0, 0x3, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="515c13df64c59cb2ff44dad42cde1a577171f4d481075d05f795143c3a27244998d5cc91665b85ac22f1429359f9dc", 0x2f, 0xbc9a, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8000, r0, &(0x7f0000000cc0)="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", 0x1000, 0x6033, 0x0, 0x3, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x3, r2, &(0x7f00000003c0)="630ffd56842f731ce28eca03bb751839aac0d41a915bce9487c29486e562c1d31e0a173e0da765572c153e9a3e297368f4730cf28ada5d723e0f429ff338ebeb940c37584a4e1a7cfdb5db713fe534524e9e1e2721eced3cad709e453e2b5ed06cd1746cb73c97e53887c42546cd9419796570fac70f5b0ba4421d8658332f", 0x7f, 0x9, 0x0, 0x3, r2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x2, r4, &(0x7f0000000480)="daed5fb648ed039172147ecdc7e6f643a3b6b35844c0773a6a8f562c3a15eacb6e637dade5723adf42f2243be09d7382713eaf992c41ba799a90e3c3004626fecb2781f4dca7a0f62c2d45f859ab565e472dd4d0a3913bf85eb5c639", 0x5c, 0x8, 0x0, 0x1, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xd, 0x8001, r6, &(0x7f0000000540), 0x0, 0x5, 0x0, 0x3, r2}]) inotify_rm_watch(r2, 0x0) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) r3 = msgget$private(0x0, 0x40) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000240)=""/4) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/142) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) msgget(0x3, 0x80) unshare(0x4028000) 01:36:21 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:21 executing program 1: unshare(0x2c020400) getpgid(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) r3 = msgget$private(0x0, 0x40) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000240)=""/4) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/142) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) msgget(0x3, 0x80) unshare(0x4028000) 01:36:21 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0xf85, 0x303040) unshare(0x20010400) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 01:36:21 executing program 4: r0 = msgget$private(0x0, 0x80) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:21 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) unshare(0x64000a80) 01:36:21 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) io_submit(0x0, 0x6, &(0x7f00000005c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0xf658, 0xffffffffffffffff, &(0x7f0000000140)="41c25025b5c5432d9578eddfb653ea49df0972d1396a2281c3c8c2b9adaa457caf91b2a4870872636850c14e6a9b36be26a74497141e8ad5ece0d582f3b2ad5f6b65fabeac25f1e32a8cba589012ffb58ef44ac5dcf28a11ec5964df2103a0873a47995463e0b5e4b0132f8f243f9485b92cffff", 0x74, 0x10000, 0x0, 0x3, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000240)="515c13df64c59cb2ff44dad42cde1a577171f4d481075d05f795143c3a27244998d5cc91665b85ac22f1429359f9dc", 0x2f, 0xbc9a, 0x0, 0x3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x2, 0x8000, r0, &(0x7f0000000cc0)="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", 0x1000, 0x6033, 0x0, 0x3, r3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x3, r2, &(0x7f00000003c0)="630ffd56842f731ce28eca03bb751839aac0d41a915bce9487c29486e562c1d31e0a173e0da765572c153e9a3e297368f4730cf28ada5d723e0f429ff338ebeb940c37584a4e1a7cfdb5db713fe534524e9e1e2721eced3cad709e453e2b5ed06cd1746cb73c97e53887c42546cd9419796570fac70f5b0ba4421d8658332f", 0x7f, 0x9, 0x0, 0x3, r2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x2, r4, &(0x7f0000000480)="daed5fb648ed039172147ecdc7e6f643a3b6b35844c0773a6a8f562c3a15eacb6e637dade5723adf42f2243be09d7382713eaf992c41ba799a90e3c3004626fecb2781f4dca7a0f62c2d45f859ab565e472dd4d0a3913bf85eb5c639", 0x5c, 0x8, 0x0, 0x1, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0xd, 0x8001, r6, &(0x7f0000000540), 0x0, 0x5, 0x0, 0x3, r2}]) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) r3 = msgget$private(0x0, 0x40) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000240)=""/4) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/142) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) msgget(0x3, 0x80) 01:36:21 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) inotify_rm_watch(r2, 0x0) 01:36:21 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x0) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:21 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:21 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) r3 = msgget$private(0x0, 0x40) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000240)=""/4) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/142) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:21 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) unshare(0x40050200) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) r3 = msgget$private(0x0, 0x40) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000240)=""/4) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f0000000000)=""/142) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:21 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:21 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e24, 0xd23, @remote, 0x7}, {0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x17}, 0x4}, 0xb6, [0x187b8afc, 0x9, 0x4, 0x1ff, 0x4, 0x5, 0x3, 0xd342]}, 0x5c) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@rand_addr=' \x01\x00', 0x80}) 01:36:21 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r2, 0x0) 01:36:21 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) r3 = msgget$private(0x0, 0x40) msgctl$MSG_STAT_ANY(r3, 0xd, &(0x7f0000000240)=""/4) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:21 executing program 0: unshare(0x2c020400) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 01:36:21 executing program 4: r0 = msgget$private(0x0, 0x140) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) r1 = msgget$private(0x0, 0x0) msgget$private(0x0, 0x40) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgrcv(r1, &(0x7f0000000000)={0x0, ""/106}, 0x72, 0x1, 0x0) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) msgget$private(0x0, 0x40) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:21 executing program 1: unshare(0x2c020400) unshare(0x40000500) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) getpgrp(0x0) syz_open_dev$vcsn(&(0x7f0000000040), 0x4b, 0x0) r1 = accept4(r0, &(0x7f0000000100)=@hci, &(0x7f0000000180)=0x80, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 01:36:21 executing program 0: unshare(0x2c020400) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 01:36:21 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:21 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) inotify_rm_watch(r2, 0x0) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) unshare(0x200) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:21 executing program 1: sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x14c, 0x0, 0x230, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x69835522}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xc}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x64010100}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6e5e6630}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1db5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x400}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_SERVICE={0x70, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x8}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr=' \x01\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x24}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x31, 0x32}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x38}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x200cc000}, 0x4000000) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x42000, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8008700b, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r2) sendmsg$IPVS_CMD_GET_INFO(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xc0, r5, 0x100, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1d}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x24}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20884}, 0x40004) 01:36:21 executing program 0: unshare(0x2c020400) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 01:36:21 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) msgctl$IPC_STAT(0x0, 0xb, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:21 executing program 1: unshare(0x2c020400) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000180)=0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000129bd7000ffdbdf25100000000c000280080005000300000014000380080001000000000006000400090000002400038008000100020000000800030000000000060007004e22000008000500ac1e00000800050000100000"], 0x60}, 0x1, 0x0, 0x0, 0x840}, 0x801) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) gettid() 01:36:22 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:22 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:22 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget(0x2, 0x403) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:22 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r2, 0x0) 01:36:22 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:22 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:22 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) accept(r0, &(0x7f0000000040)=@l2, &(0x7f00000000c0)=0x21) unshare(0x2c020400) openat$random(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:22 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:22 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/88) msgctl$IPC_STAT(r0, 0xb, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:36:22 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x100000001, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:22 executing program 0: unshare(0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:22 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:22 executing program 4: r0 = msgget$private(0x0, 0x209) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:22 executing program 0: unshare(0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:22 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:22 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) inotify_rm_watch(r2, 0x0) 01:36:22 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, '\x00', 0x2f}, 0x5, 0x1, 0xff, 0x7, 0x5}, 0x20) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) msgget$private(0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 0: unshare(0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:23 executing program 1: unshare(0x2c020400) unshare(0x18040880) syz_open_dev$vcsn(&(0x7f0000000000), 0x5, 0x200003) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x1000100) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) syz_open_dev$rtc(&(0x7f0000000080), 0x1, 0x23e082) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x242080, 0x0) syz_open_dev$rtc(&(0x7f0000000100), 0x87, 0x400) unshare(0x40000000) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) 01:36:23 executing program 4: msgget$private(0x0, 0x0) r0 = msgget$private(0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r1) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0xee00, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0x2, 0x0, 0x40, 0xffffffffffffffff, 0x100, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_generic(0x10, 0x3, 0x10) msgctl$IPC_STAT(r0, 0xb, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000200)=""/4096) 01:36:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r2, 0x0) 01:36:23 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x6b0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:23 executing program 4: r0 = msgget$private(0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) unshare(0x2c020400) r1 = msgget$private(0x0, 0x3cb) msgctl$IPC_STAT(r0, 0xb, 0x0) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/49) 01:36:23 executing program 1: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x509340, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) inotify_rm_watch(r2, 0x0) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:23 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:23 executing program 4: r0 = msgget$private(0x0, 0x1c9) unshare(0x2324c96a05d52ae3) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) getsockname$inet6(r1, &(0x7f0000000000), &(0x7f0000000040)=0x1c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) msgget$private(0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xe8, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfa6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xaf}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010100}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1b3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2={0xfc, 0x2, '\x00', 0x3f}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xc62}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x8000) 01:36:23 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000000), 0x9) 01:36:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) inotify_rm_watch(r2, 0x0) 01:36:23 executing program 4: msgget$private(0x0, 0x0) unshare(0x2c020400) r0 = accept(0xffffffffffffffff, &(0x7f0000001080)=@nfc_llcp, &(0x7f0000001100)=0x80) sendto$inet6(r0, &(0x7f0000001140)="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", 0x1000, 0x24004811, &(0x7f0000002140)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @local}, 0x6af800}, 0x1c) r1 = msgget$private(0x0, 0x121) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/4096) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000001000)={'TPROXY\x00'}, &(0x7f0000001040)=0x1e) 01:36:23 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x258440) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:23 executing program 0: unshare(0x2c020400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) msgget$private(0x0, 0x101) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 4: msgctl$MSG_STAT(0xffffffffffffffff, 0xb, &(0x7f0000000000)=""/240) r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:23 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000340), 0x4000) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r2, 0x0) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000280)) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 1: unshare(0x2c020400) unshare(0x26020500) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) geteuid() getsockname$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:23 executing program 4: ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000000)) r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/auth_rpcgss', 0x60000, 0x99) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x2d, 0x33, 0x200000b, 0xd, 0x9, 0x5, 0x1, 0x57, 0x1}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r2, 0x8008700d, &(0x7f00000000c0)) msgctl$IPC_STAT(r0, 0xb, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x4, 0x4) 01:36:23 executing program 0: unshare(0x2c020400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:23 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x383403) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 01:36:23 executing program 0: unshare(0x2c020400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x9) 01:36:23 executing program 4: r0 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000040)=""/107) unshare(0x2c020400) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) getpgrp(r1) openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x202102, 0x0) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) write$cgroup_type(r0, 0x0, 0x0) 01:36:23 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:23 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) r1 = msgget(0x0, 0x480) r2 = getgid() r3 = getpgid(0xffffffffffffffff) r4 = gettid() ptrace$pokeuser(0x6, r4, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000000)={{0x3, 0x0, r2, 0xffffffffffffffff, 0xee01, 0x10}, 0x0, 0x0, 0x0, 0x8, 0x8, 0x100, 0x80000000, 0x6, 0x3ff, 0x5, r3, r4}) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:23 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:23 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={@private2, 0x60}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x800010, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@debug={'debug', 0x3d, 0x5}}, {@version_u}, {@cachetag={'cachetag', 0x3d, '}*&;@[/!(-!%&'}}], [{@smackfshat={'smackfshat', 0x3d, '-@{%]%\\,{\'*\\!'}}, {@subj_type={'subj_type', 0x3d, 'debug'}}, {@uid_gt={'uid>', 0xee01}}, {@fowner_eq}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x2b}}]}}) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) r2 = socket(0x2c, 0x800, 0x80) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x60, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffe}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x45}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7ff}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10e0}, 0x2008008d) 01:36:23 executing program 3: r0 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f00000001c0)=""/107) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:23 executing program 4: r0 = msgget$private(0x0, 0x544) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="79f77215", @ANYRES16=0x0, @ANYBLOB="020028bd7000fedbdf25100000000c0003800800030004000000080004000400000044000380060007004e200000060007004e24000008000500ac1e00010800030001000000080003000300000008000100000000000500080014000000080005000a010100"], 0x6c}, 0x1, 0x0, 0x0, 0x44000}, 0x800) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000440)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x14) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r3) unshare(0x2c020400) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x84, 0x0, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffb}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff5f5b}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6c000000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2e0}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe49}]}, 0x84}, 0x1, 0x0, 0x0, 0x2000c8d1}, 0x4) io_setup(0x6, &(0x7f0000000480)=0x0) io_getevents(r5, 0x0, 0x3, &(0x7f00000004c0)=[{}, {}, {}], &(0x7f0000000540)={0x77359400}) msgctl$IPC_STAT(r0, 0xb, 0x0) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x2c, &(0x7f0000000300)={0x0, {{0xa, 0x4e21, 0x8001, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3}}, {{0xa, 0x4e22, 0xffffffff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x100}}}, 0x108) 01:36:23 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:23 executing program 3: msgget$private(0x0, 0x0) unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x121040) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:23 executing program 3: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:23 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000040)={@remote, @empty, @private2={0xfc, 0x2, '\x00', 0x1}, 0x5, 0x6, 0x800, 0x500, 0xfffffffffffffbff, 0x1}) 01:36:23 executing program 4: r0 = msgget$private(0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0xe2900) msgctl$IPC_RMID(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r2, 0x0) 01:36:23 executing program 3: unshare(0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:23 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 3: unshare(0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:24 executing program 1: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:24 executing program 4: accept(0xffffffffffffffff, &(0x7f0000000080)=@generic, &(0x7f0000000100)=0x80) r0 = socket$inet6(0xa, 0x80000, 0x2) r1 = accept(r0, &(0x7f0000000240)=@ipx, &(0x7f0000000180)=0x80) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000200)=0x4) r2 = msgget$private(0x0, 0x0) unshare(0x5c080700) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f00000001c0)=ANY=[@ANYBLOB='U\x00\x00\x00\x00\x00\x00\x00'], 0x8) msgctl$IPC_STAT(r2, 0xb, 0x0) r4 = msgget$private(0x0, 0x5c) msgctl$MSG_INFO(r4, 0xc, &(0x7f0000000000)=""/68) 01:36:24 executing program 3: unshare(0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000180)=0x1c) 01:36:24 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 3: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000180)) 01:36:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r1, 0x0) 01:36:24 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) syz_open_dev$vcsn(&(0x7f0000000040), 0xffa8, 0x0) 01:36:24 executing program 3: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:24 executing program 4: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r2 = gettid() getpgrp(r2) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x82002, 0xa8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000300)={0xfffffffc, {{0xa, 0x4e22, 0x4, @mcast1, 0x4}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) 01:36:24 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r1, 0x0) 01:36:24 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) unshare(0x10000300) 01:36:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r2 = gettid() getpgrp(r2) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r1, 0x0) 01:36:24 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r2 = gettid() getpgrp(r2) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x81, 0x200040) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r1}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@mcast2, r1}, 0x14) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r1, 0x0) 01:36:24 executing program 4: msgget$private(0x0, 0x46a) unshare(0x2c020400) 01:36:24 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x7) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:24 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r2 = gettid() getpgrp(r2) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x20030c80) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r1, 0x0) 01:36:24 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x82002, 0xa8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000300)={0xfffffffc, {{0xa, 0x4e22, 0x4, @mcast1, 0x4}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) 01:36:24 executing program 3: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:24 executing program 4: r0 = msgget$private(0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) unshare(0x2c020400) msgget$private(0x0, 0x200) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r1, 0x0) 01:36:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x82002, 0xa8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000300)={0xfffffffc, {{0xa, 0x4e22, 0x4, @mcast1, 0x4}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) 01:36:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 4: msgget$private(0x0, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x400) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) unshare(0x2c020400) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 3: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:24 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r0, 0x0) 01:36:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x3e030000) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/201) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 2: unshare(0x2c020400) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x82002, 0xa8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000300)={0xfffffffc, {{0xa, 0x4e22, 0x4, @mcast1, 0x4}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) 01:36:24 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r0, 0x0) 01:36:24 executing program 3: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:24 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 2: unshare(0x2c020400) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x82002, 0xa8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000300)={0xfffffffc, {{0xa, 0x4e22, 0x4, @mcast1, 0x4}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) 01:36:24 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000000000002d9b4d4f4a04c7e9d9aff50e13c07a18a407e06281857f96e38b34293b00929bda60f0131e07e3305b62c7cc58aae1c6531d13d3cbec14b9f9358183ab4407d465e050d2bdc10319c012ca8e37fb2148d507ffab2cb9eb43fed66e3c997b801384a5f87453a270a2d66acec10d1a9577ec77"], 0x4c, 0xb4a2d33f7b07a407) unshare(0x2c020400) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000080)=""/190) r1 = getgid() msgctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x0, 0xee00, r1, 0xffffffffffffffff, 0xee00, 0x4, 0x800}, 0x0, 0x0, 0x88fc, 0xffffffffffff0000, 0x100, 0x2, 0x3, 0x5, 0x80, 0x8bb}) msgctl$IPC_STAT(r0, 0xb, 0x0) msgctl$IPC_RMID(0x0, 0x0) 01:36:24 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) unshare(0x2c020400) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r0, 0x0) 01:36:24 executing program 2: unshare(0x2c020400) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r2 = gettid() getpgrp(r2) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x124) unshare(0x2c020400) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:24 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x82002, 0xa8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000300)={0xfffffffc, {{0xa, 0x4e22, 0x4, @mcast1, 0x4}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@private}}, &(0x7f00000001c0)=0xe8) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:24 executing program 0: unshare(0x2c020400) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:24 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r0, 0x0) 01:36:24 executing program 4: r0 = msgget$private(0x0, 0x1) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:24 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r2 = gettid() getpgrp(r2) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x124) unshare(0x2c020400) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 4: r0 = msgget$private(0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4b, &(0x7f0000000000)=0x9f72, 0x4) unshare(0x2c020400) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x1b, &(0x7f0000000040)="1c48dbe9f085e7a1f84e0c2cd19c50e227b798150e63a6cbd55618f44797d57b3b7b1cb82ff36c7e3eef084c24fc45e908653a5fa545dd9319c08029a9e92936315ab14a722084213fefee3d162bbede7e65cd340bfaaab130f9a11ca3ed480327ab071cbab7b634331a7ab8fea4e122ed7e65deb964432f", 0x78) unshare(0x20100) msgctl$IPC_STAT(r0, 0xb, 0x0) msgrcv(r0, &(0x7f0000000300)={0x0, ""/4096}, 0x1008, 0x2, 0x2800) 01:36:25 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x82002, 0xa8) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000300)={0xfffffffc, {{0xa, 0x4e22, 0x4, @mcast1, 0x4}}}, 0x88) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 0: unshare(0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:25 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) inotify_rm_watch(r0, 0x0) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x124) unshare(0x2c020400) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r2 = gettid() getpgrp(r2) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 0: unshare(0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:25 executing program 4: r0 = msgget$private(0x0, 0x504) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x4020940d, 0x401000) r2 = msgget$private(0x0, 0x157) r3 = getpid() msgctl$IPC_SET(r2, 0x1, &(0x7f0000000000)={{0x2, 0x0, 0xee00, 0xee01, 0xee00, 0x81, 0x81}, 0x0, 0x0, 0x1, 0x9, 0x1, 0x8000, 0x9c31, 0x4, 0xacf, 0xfb, r3}) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug', 0x82002, 0xa8) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsa(0x0, 0x3, 0x0) inotify_rm_watch(r0, 0x0) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x2c020400) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) gettid() setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 0: unshare(0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:25 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsa(0x0, 0x3, 0x0) inotify_rm_watch(r0, 0x0) 01:36:25 executing program 4: r0 = msgget$private(0x0, 0x0) io_setup(0x3, &(0x7f00000000c0)=0x0) io_destroy(r1) io_submit(r1, 0x0, 0x0) msgget$private(0x0, 0x110) unshare(0x2c020400) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) gettid() setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsa(0x0, 0x3, 0x0) inotify_rm_watch(r0, 0x0) 01:36:25 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) gettid() setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x0) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_RMID(r0, 0x0) msgget$private(0x0, 0x300) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 1: unshare(0x2c020400) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:25 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x2c020400) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 5: unshare(0x2c020400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 1: unshare(0x2c020400) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:25 executing program 4: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:25 executing program 5: unshare(0x2c020400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:25 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x2c020400) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 1: syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) 01:36:25 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) io_setup(0x3, &(0x7f0000000000)) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 5: unshare(0x2c020400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:25 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x2c020400) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:25 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) gettid() 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 1: syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x2c020400) inotify_add_watch(r0, 0x0, 0x40000a01) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 5: unshare(0x2c020400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:25 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) 01:36:25 executing program 1: syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000000)=""/60) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x2c020400) inotify_add_watch(r0, 0x0, 0x0) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) 01:36:25 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:25 executing program 4: msgget$private(0x0, 0x0) unshare(0x2c020400) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_STAT(r0, 0xb, 0x0) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/109) 01:36:25 executing program 1: unshare(0x0) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x2c020400) inotify_add_watch(r0, 0x0, 0x0) 01:36:25 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) 01:36:25 executing program 3: r0 = msgget$private(0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:25 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:25 executing program 1: unshare(0x0) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:25 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) unshare(0x300) unshare(0x12010500) 01:36:26 executing program 3: r0 = msgget$private(0x0, 0x0) getpid() msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:26 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) 01:36:26 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x0) unshare(0x2c020400) inotify_add_watch(r0, 0x0, 0x0) 01:36:26 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:26 executing program 1: unshare(0x0) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:26 executing program 3: r0 = msgget$private(0x0, 0x0) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:26 executing program 0: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) unshare(0x2c020400) unshare(0x2020000) 01:36:26 executing program 4: r0 = msgget$private(0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:26 executing program 2: unshare(0x2c020400) syz_read_part_table(0x8, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:26 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:26 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:26 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) msgctl$IPC_RMID(0x0, 0x0) 01:36:26 executing program 0: msgget$private(0x0, 0x0) getpid() unshare(0x2c020400) unshare(0x2020000) 01:36:26 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x6b, r5}) r6 = msgget$private(0x0, 0x101) r7 = msgget$private(0x0, 0x40) msgsnd(r7, &(0x7f00000003c0)={0x1, "f609220d398c7e9a1a8ca36c2f2c2bfaba1225"}, 0x1b, 0x0) msgsnd(r6, &(0x7f0000000100)={0x1, "f0bc5e6dada0dfd9494af6d3b6f8a9f4a43512371b48c7963a"}, 0x21, 0x0) 01:36:26 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) msgctl$IPC_RMID(0x0, 0x0) [ 880.822224][T14290] loop2: detected capacity change from 0 to 264192 01:36:26 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:26 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:26 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x0, 0x0) 01:36:26 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) msgctl$IPC_RMID(0x0, 0x0) 01:36:26 executing program 0: msgget$private(0x0, 0x0) unshare(0x2c020400) unshare(0x2020000) 01:36:26 executing program 3: msgget$private(0x0, 0x0) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:26 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x0, 0x0) 01:36:26 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) unshare(0x2c020400) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:26 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:26 executing program 4: r0 = msgget$private(0x0, 0x0) msgget$private(0x0, 0x5c) unshare(0x2c020400) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000000)={0x4, {{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, '\x00', 0xf}, 0x5}}}, 0x88) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000000c0)=""/44) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:26 executing program 0: unshare(0x2c020400) unshare(0x2020000) 01:36:26 executing program 3: msgget$private(0x0, 0x0) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:26 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x0, 0x0) 01:36:26 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) 01:36:26 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:26 executing program 3: msgget$private(0x0, 0x0) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:26 executing program 0: unshare(0x0) unshare(0x2020000) 01:36:26 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}]) 01:36:26 executing program 4: r0 = msgget$private(0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0xee00, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgrcv(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600"/262], 0x106, 0x1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:26 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) r1 = gettid() getpgrp(r1) 01:36:26 executing program 3: msgget$private(0x0, 0x601) unshare(0x0) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:26 executing program 0: unshare(0x0) unshare(0x2020000) 01:36:26 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:26 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}]) 01:36:26 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) gettid() 01:36:26 executing program 3: msgget$private(0x0, 0x601) unshare(0x0) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:26 executing program 0: unshare(0x0) unshare(0x2020000) 01:36:26 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}]) 01:36:26 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:26 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) 01:36:27 executing program 4: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x11}, 0x617}, {0xa, 0x4e22, 0x4, @private0, 0x81}, 0x0, [0x8, 0xffff8e0b, 0xff, 0x5, 0x8, 0xc1a0, 0x4, 0x5]}, 0x5c) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x34, r1, 0x206, 0x70bd2d, 0x25dfdbfc, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x90}, 0x8800) getsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f0000000140)={@private2}, &(0x7f0000000180)=0x14) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e24, 0x400, @loopback, 0xfffffc01}, 0x1c) r2 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000080)=""/84) msgctl$IPC_STAT(r2, 0xb, 0x0) 01:36:27 executing program 0: unshare(0x2c020400) unshare(0x0) 01:36:27 executing program 3: msgget$private(0x0, 0x601) unshare(0x0) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {0x0, 0x0, 0x5}]) 01:36:27 executing program 5: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) unshare(0x2c020400) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:27 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {0x0, 0x0, 0x5}]) 01:36:27 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) 01:36:27 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) msgget$private(0x0, 0x601) unshare(0x2020000) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {0x0, 0x0, 0x5}]) 01:36:27 executing program 5: msgget$private(0x0, 0x0) geteuid() getgid() getpgrp(0x0) unshare(0x2c020400) r0 = msgget(0x3, 0x210) msgctl$IPC_RMID(r0, 0x0) 01:36:27 executing program 0: unshare(0x2c020400) unshare(0x0) 01:36:27 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x81, 0x1) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000040)) r1 = accept4(r0, &(0x7f0000000080)=@ipx, &(0x7f0000000100)=0x80, 0x800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e21, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xfffffff9}, {0xa, 0x4e22, 0x3, @private0, 0x8a0}, 0xfffb, [0x5, 0x3, 0x1, 0x80, 0x2, 0x10000, 0x7fffffff, 0x3]}, 0x5c) accept(r1, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000280)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x62, r2}) r3 = msgget$private(0x0, 0x0) unshare(0x2c020400) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @loopback}}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast1}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010102}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xf}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0xa0}}, 0x24000010) msgctl$IPC_STAT(r3, 0xb, 0x0) msgctl$IPC_RMID(r3, 0x0) 01:36:27 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x0) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:27 executing program 2: msgget$private(0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, 0xffffffffffffffff, 0x11, &(0x7f0000000000)={0xb, 0xb4f5, 0x8001}) unshare(0x2c020400) unshare(0x2020000) 01:36:27 executing program 5: msgget$private(0x0, 0x0) geteuid() getgid() unshare(0x2c020400) r0 = msgget(0x3, 0x210) msgctl$IPC_RMID(r0, 0x0) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280), 0x0, 0x5}]) 01:36:27 executing program 0: unshare(0x2c020400) unshare(0x0) 01:36:27 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x0) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280), 0x0, 0x5}]) 01:36:27 executing program 2: msgget$private(0x0, 0x0) getpid() unshare(0x2c020400) unshare(0x2020000) 01:36:27 executing program 4: r0 = msgget$private(0x0, 0x0) r1 = geteuid() r2 = getgid() r3 = getpgrp(0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000040)={{0x1, r1, 0xffffffffffffffff, 0x0, r2, 0x0, 0x2}, 0x0, 0x0, 0x2, 0x9, 0x7, 0x6ce, 0x1000, 0x3, 0x7, 0x4, r3}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/50) r4 = msgget(0x3, 0x210) msgctl$IPC_RMID(r4, 0x0) 01:36:27 executing program 5: msgget$private(0x0, 0x0) geteuid() unshare(0x2c020400) r0 = msgget(0x3, 0x210) msgctl$IPC_RMID(r0, 0x0) 01:36:27 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x0) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:27 executing program 0: msgget$private(0x0, 0x0) unshare(0x2c020400) unshare(0x2020000) 01:36:27 executing program 2: msgget$private(0x0, 0x0) unshare(0x2c020400) unshare(0x2020000) 01:36:27 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x6b, r5}) r6 = msgget$private(0x0, 0x101) r7 = msgget$private(0x0, 0x40) msgsnd(r7, &(0x7f00000003c0)={0x1, "f609220d398c7e9a1a8ca36c2f2c2bfaba1225"}, 0x1b, 0x0) msgsnd(r6, &(0x7f0000000100)={0x1, "f0bc5e6dada0dfd9494af6d3b6f8a9f4a43512371b48c7963a"}, 0x21, 0x0) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280), 0x0, 0x5}]) 01:36:27 executing program 5: msgget$private(0x0, 0x0) unshare(0x2c020400) r0 = msgget(0x3, 0x210) msgctl$IPC_RMID(r0, 0x0) 01:36:27 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:27 executing program 0: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27d964c80f050d", 0xd, 0x5}]) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8798660cdbc27", 0x7, 0x5}]) 01:36:27 executing program 2: unshare(0x2c020400) unshare(0x2020000) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8", 0x1, 0x5}]) 01:36:27 executing program 5: unshare(0x2c020400) r0 = msgget(0x3, 0x210) msgctl$IPC_RMID(r0, 0x0) 01:36:27 executing program 2: unshare(0x0) unshare(0x2020000) 01:36:27 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) msgctl$IPC_STAT(0x0, 0xb, 0x0) [ 882.506556][T14496] loop0: detected capacity change from 0 to 264192 01:36:27 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x6b, r5}) r6 = msgget$private(0x0, 0x101) r7 = msgget$private(0x0, 0x40) msgsnd(r7, &(0x7f00000003c0)={0x1, "f609220d398c7e9a1a8ca36c2f2c2bfaba1225"}, 0x1b, 0x0) msgsnd(r6, &(0x7f0000000100)={0x1, "f0bc5e6dada0dfd9494af6d3b6f8a9f4a43512371b48c7963a"}, 0x21, 0x0) 01:36:27 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280), 0x0, 0x5}]) 01:36:27 executing program 0: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280), 0x0, 0x5}]) 01:36:27 executing program 5: unshare(0x0) r0 = msgget(0x3, 0x210) msgctl$IPC_RMID(r0, 0x0) 01:36:28 executing program 2: unshare(0x0) unshare(0x2020000) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280), 0x0, 0x5}]) 01:36:28 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:28 executing program 5: unshare(0x0) r0 = msgget(0x3, 0x210) msgctl$IPC_RMID(r0, 0x0) 01:36:28 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x6b, r5}) r6 = msgget$private(0x0, 0x101) r7 = msgget$private(0x0, 0x40) msgsnd(r7, &(0x7f00000003c0)={0x1, "f609220d398c7e9a1a8ca36c2f2c2bfaba1225"}, 0x1b, 0x0) msgsnd(r6, &(0x7f0000000100)={0x1, "f0bc5e6dada0dfd9494af6d3b6f8a9f4a43512371b48c7963a"}, 0x21, 0x0) 01:36:28 executing program 2: unshare(0x0) unshare(0x2020000) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280), 0x0, 0x5}]) 01:36:28 executing program 3: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:28 executing program 5: unshare(0x0) r0 = msgget(0x3, 0x210) msgctl$IPC_RMID(r0, 0x0) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x6, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000680)="df49b7e225b936fd3ef432b7e6d94747216c7aa250eb7104dda0f90b8162862616eed544d69172e4899de33fbdfe9c44b4d0af12260c755250fb347034d4a9c5fd0a7022aa579f7be12a6f94705ad7a864b43a063059a1a289a3d34b59b5560e475a9251f5743693faa4f4c83bce2527a8740d50d32baeba05f144464d3c14620d550384ce065fd743b7dfe30951979c3dcca17d969395a5b3f5d4ca11b4bbbadcaa85a0085e0c008089e28786130987121406d38bc5fb3343adea746703a10914bd00b515df", 0xc6, 0x45d9cbb5}, {&(0x7f0000000280)="c8", 0x1}]) [ 882.708877][T14535] loop0: detected capacity change from 0 to 264192 01:36:28 executing program 0: msgget$private(0x0, 0x601) unshare(0x2c020400) unshare(0x2020000) getpgrp(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e24, 0x7f, @private1, 0x28}, {0xa, 0x4e24, 0x7, @private0={0xfc, 0x0, '\x00', 0x1}, 0xffffffc0}, 0x52, [0x7, 0x5, 0xfffffffd, 0x9, 0x6, 0x82b, 0x5, 0x7]}, 0x5c) msgctl$IPC_STAT(0x0, 0xb, 0x0) 01:36:28 executing program 2: unshare(0x2c020400) unshare(0x0) 01:36:28 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x6b, r5}) msgget$private(0x0, 0x101) r6 = msgget$private(0x0, 0x40) msgsnd(r6, &(0x7f00000003c0)={0x1, "f609220d398c7e9a1a8ca36c2f2c2bfaba1225"}, 0x1b, 0x0) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:28 executing program 5: unshare(0x2c020400) r0 = msgget(0x3, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:28 executing program 2: unshare(0x2c020400) unshare(0x0) 01:36:28 executing program 0: r0 = msgget$private(0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0xe2900) msgctl$IPC_RMID(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) unshare(0x2c020400) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {0x0}]) 01:36:28 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x6b, r5}) msgget$private(0x0, 0x101) msgget$private(0x0, 0x40) 01:36:28 executing program 5: unshare(0x2c020400) r0 = msgget(0x3, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:28 executing program 2: unshare(0x2c020400) unshare(0x0) 01:36:28 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x40000a01) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {0x0}]) 01:36:28 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x6b, r5}) msgget$private(0x0, 0x101) 01:36:28 executing program 5: unshare(0x2c020400) r0 = msgget(0x3, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:28 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config', 0x0, 0x124) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0045878, 0x0) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0xfffffffffffffffc, 0x103581) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd401000000000000}]) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x1c) inotify_rm_watch(0xffffffffffffffff, 0x0) 01:36:28 executing program 5: unshare(0x2c020400) msgget(0x3, 0x210) msgctl$IPC_RMID(0x0, 0x0) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {0x0}]) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) 01:36:28 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x6b, r5}) 01:36:28 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, '\x00', 0x2f}, 0x5, 0x1, 0xff, 0x7, 0x5}, 0x20) 01:36:28 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e24, 0xd23, @remote, 0x7}, {0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x17}, 0x4}, 0xb6, [0x187b8afc, 0x9, 0x4, 0x1ff, 0x4, 0x5, 0x3, 0xd342]}, 0x5c) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@rand_addr=' \x01\x00', 0x80}) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) 01:36:28 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000280)}]) 01:36:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) r1 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) 01:36:28 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e24, 0xd23, @remote, 0x7}, {0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x17}, 0x4}, 0xb6, [0x187b8afc, 0x9, 0x4, 0x1ff, 0x4, 0x5, 0x3, 0xd342]}, 0x5c) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@rand_addr=' \x01\x00', 0x80}) 01:36:28 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:28 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in=@initdev}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000280)}]) 01:36:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) r1 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:28 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e24, 0xd23, @remote, 0x7}, {0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x17}, 0x4}, 0xb6, [0x187b8afc, 0x9, 0x4, 0x1ff, 0x4, 0x5, 0x3, 0xd342]}, 0x5c) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000200)={@rand_addr=' \x01\x00', 0x80}) 01:36:28 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) r4 = socket$inet6(0xa, 0x6, 0x1) accept(r4, &(0x7f0000000240)=@l2, &(0x7f00000002c0)=0x80) 01:36:28 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x1) r1 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8a320ec15c24c20c7c15a440e04416fd4443e204dced6148cd56a88bfb2f722dc6dc8919b1df36366eead44ab230e6f2da4bfcc9135f8ff21b9441430c70554c9ea173a20abbc7ca12aa612be36bf9d40441a0e7fa37c6495a18f5f2912bb8fd2", 0xc1, 0xffffffffffffffff}, {&(0x7f0000000280)}]) 01:36:28 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:28 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e24, 0xd23, @remote, 0x7}, {0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x17}, 0x4}, 0xb6, [0x187b8afc, 0x9, 0x4, 0x1ff, 0x4, 0x5, 0x3, 0xd342]}, 0x5c) accept4(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) 01:36:28 executing program 0: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:28 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) socket$inet6(0xa, 0x6, 0x1) 01:36:28 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:28 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e24, 0xd23, @remote, 0x7}, {0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, '\x00', 0x17}, 0x4}, 0xb6, [0x187b8afc, 0x9, 0x4, 0x1ff, 0x4, 0x5, 0x3, 0xd342]}, 0x5c) 01:36:28 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x600) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, r3, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) setsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:28 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:28 executing program 2: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:28 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) 01:36:28 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) 01:36:28 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x600) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, r3, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) setsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000600)=""/245) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 2: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = msgget$private(0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x2}, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 01:36:29 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) 01:36:29 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x600) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, r3, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) setsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {0x0, 0x0, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 2: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) msgget$private(0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x600) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, r3, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) setsockopt$inet6_mreq(r4, 0x29, 0x0, 0x0, 0x0) 01:36:29 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {0x0, 0x0, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x600) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, r3, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x40004) 01:36:29 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) msgget$private(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {0x0, 0x0, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x600) 01:36:29 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) msgget$private(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) socket$inet6_tcp(0xa, 0x1, 0x0) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580), 0x0, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 2: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 3: unshare(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) msgget$private(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r3, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:29 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580), 0x0, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 3: unshare(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 2: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:29 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x1, {{0xa, 0x4e22, 0x9, @remote}}}, 0x88) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580), 0x0, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 3: unshare(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 2: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8", 0x61, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:29 executing program 5: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98cb41db8f3cde5b452404000082209f6d29e80ef21e4106bd51118f565b1fcb7b9b36cc042169964d8a36e63c961189edf9e5069b10b87cc546f86b05bcd93e8e95f75a766707d8c9633925cdce2d07df453a41787debaeb7dc9e2476c0664f92274eb7a3c5baf3b94984b154e826ff57ebf8f2ceb2409fdc317af30d13eecc6b3cf729e0de75688979211076b4e219d4854def7fa55a9e644835d244c926ebda3d3dd657a572f8cd6e6b0e82f5d9dbe97dfcffa6f5875a2f33f87cdb1396a97844be91729aafe32b461aa7c865", @ANYRES16=r1, @ANYBLOB="00022dbd7000fcdbdf250100000008000300080000000800020005000000"], 0x24}, 0x1, 0x0, 0x0, 0x2004d040}, 0x4000010) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x5e07f6d3, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 5: unshare(0x2c020400) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:29 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 5: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4ef", 0x31, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 5: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:29 executing program 0: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) msgget$private(0x0, 0x0) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:29 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:29 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:29 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:29 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 5: pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 4: accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 5: unshare(0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 2: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 4: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 5: unshare(0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a99983", 0x19, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 2: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 4: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 5: unshare(0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 2: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 0: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 4: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 5: unshare(0x2c020400) pipe2(0x0, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 01:36:30 executing program 0: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 5: unshare(0x2c020400) pipe2(0x0, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0xa2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockname$inet6(r0, 0x0, 0x0) 01:36:30 executing program 0: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0xa2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 5: unshare(0x2c020400) pipe2(0x0, 0x4000) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc27", 0xd, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0xa2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 0: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 5: unshare(0x2c020400) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 0: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 5: unshare(0x2c020400) pipe2(&(0x7f0000000240), 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x0, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 4: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x0, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 0: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 5: unshare(0x2c020400) pipe2(&(0x7f0000000240), 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 2: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 4: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x0, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 2: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf0055", 0x7, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:30 executing program 5: unshare(0x2c020400) pipe2(&(0x7f0000000240), 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:30 executing program 4: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:30 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:30 executing program 2: unshare(0x2c020400) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:30 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:30 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 5: unshare(0x2c020400) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, 0x0, 0x300, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8583}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 5: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:31 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 5: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 2: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 5: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566c", 0x4, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 2: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:31 executing program 5: unshare(0x2c020400) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x40001) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 4: unshare(0x2c020400) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:31 executing program 2: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x4000004}, 0x40001) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 5: unshare(0x2c020400) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x40001) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 4: unshare(0x2c020400) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x40001) 01:36:31 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 5: unshare(0x2c020400) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x40001) 01:36:31 executing program 4: unshare(0x2c020400) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c56", 0x3, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:31 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:31 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:31 executing program 2: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x0, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 2: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 4: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 0: unshare(0x2c020400) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:31 executing program 5: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x0, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 2: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000080)=0x1c) 01:36:31 executing program 4: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x0, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:31 executing program 0: unshare(0x2c020400) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:31 executing program 5: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:31 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:31 executing program 4: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:31 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) 01:36:31 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 0: unshare(0x2c020400) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 5: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x40001) 01:36:32 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 2: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockname$inet6(r0, 0x0, 0x0) 01:36:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 5: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x40001) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:32 executing program 2: unshare(0x2c020400) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x0, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 2: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 5: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x40001) 01:36:32 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00'}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 2: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x0, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 5: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x40001) 01:36:32 executing program 4: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00'}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 0: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 2: unshare(0x2c020400) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x96, 0x4, 0x2, @loopback, @empty, 0x700, 0x40, 0x4, 0xd6c5}}) 01:36:32 executing program 5: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x0) 01:36:32 executing program 4: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00'}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 2: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a", 0x1, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {0x0, 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 0: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x0, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 4: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:32 executing program 5: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {0x0, 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 0: unshare(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) [ 887.095013][T15393] loop2: detected capacity change from 0 to 264192 01:36:32 executing program 4: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/resume_offset', 0x0, 0xa2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:32 executing program 5: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d79f", 0x2, 0x9c}, {&(0x7f0000000580)="9a4c566cbf005529393640bc2742618f220da12474a6a999832d568c1081976409ea0565d964a4443e27ebe84c39fbc4eff4a1c32ccbf12dcdb062b3ca285374c3d558a099be95a181312eef4e2221baed37dd80ec7c66afda7832bd81d21349f8", 0x61, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x0, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) msgget$private(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x0, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {0x0, 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 0: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) [ 887.221577][T15414] loop5: detected capacity change from 0 to 264192 01:36:32 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000040)={0x7, {{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x25}, 0x8}}, {{0xa, 0x4e20, 0x970, @private1, 0x1}}}, 0x108) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) msgget$private(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240), 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:32 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, r1, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x67}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_SERVICE={0x88, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010102}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private0}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x10000000}, 0xc000) 01:36:32 executing program 0: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240), 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) msgget$private(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:32 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:32 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, r1, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x67}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_SERVICE={0x88, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010102}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private0}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x10000000}, 0xc000) 01:36:32 executing program 0: unshare(0x2c020400) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) msgget$private(0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240), 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:32 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb8, r1, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x67}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_SERVICE={0x88, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x64010102}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x30, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private0}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x10000000}, 0xc000) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x0, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x0) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d7", 0x1, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) msgctl$IPC_STAT(r1, 0xb, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:32 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x0, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:32 executing program 5: unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) 01:36:32 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x0) 01:36:32 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:32 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240), 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:32 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) unshare(0x2c020400) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x0) 01:36:33 executing program 5: unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x0, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240), 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:36:33 executing program 4: unshare(0x2c020400) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) 01:36:33 executing program 5: unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x0, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240), 0x0, 0x9c}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x0, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:36:33 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 4: unshare(0x2c020400) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) 01:36:33 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x5, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000480)="c6bdf64a2537550a023153e2878cf9b788e6c19a7151bc674a53ac8f7dc1b9c46e68ac541934cbf487e7952c562c176dc44348c7e7b67db3a7dacb42b4a9adb8acc0084273d7dce50c80cbd5b4c81819cb8dfe0480f13f6914832f0c2767b08d4f858af67e34b047aca76d86e97eec5d7ee4fe36e9ccc2da1f74ec0902180f518d60735f988054ea1dcd034a4e0c23d2ee6711a22476f3f37038f5715458d9e3a6cd58155cb631e43368ab442d38c428cb7f45cb739f4c5e65c08d9b260243cc88537f5a11104929a1b61b5f94fe958735b1b330cf3ac0de8a9ff7130b573630d7bd0a1ee1fe11cd4df5", 0xea, 0x80000001}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x0, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) msgget$private(0x0, 0x0) unshare(0x2c020400) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 4: unshare(0x2c020400) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x0, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 2: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@local}, 0x14) unshare(0x2c020400) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:33 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {0x0}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x0, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 2: accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000140)) unshare(0x2c020400) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {0x0}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x0, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 2: unshare(0x2c020400) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {0x0}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x0, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:33 executing program 2: unshare(0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 4: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x0, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000240)}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 2: unshare(0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 4: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 2: unshare(0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:33 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000240)}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x0, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 4: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 2: unshare(0x2c020400) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621dcae261300f0a3a7132fd0965dd625e00b4a7caba46de1928b15a827e2a7efa4a0817401266953126e50fad75c42d3cc5e4f39f2ff1baee62616980e2694d216786f1b3f515fda283217023343fa4a1d104de0c6380e287426f9201fabc", 0xbb, 0x8}, {&(0x7f0000000240)}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 0: unshare(0x2c020400) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:33 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x0, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x0) accept4(r0, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:33 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:33 executing program 0: unshare(0x2c020400) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x0, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 0: unshare(0x2c020400) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:33 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:33 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x0, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:33 executing program 5: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) 01:36:33 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x0, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:34 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:34 executing program 5: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x3, &(0x7f0000000780)=[{&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 5: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) 01:36:34 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x0, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{0x0, 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:34 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x0, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{0x0, 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) 01:36:34 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x80000) 01:36:34 executing program 0: unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) 01:36:34 executing program 0: unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{0x0, 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) 01:36:34 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(0x0, r0) 01:36:34 executing program 0: unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0), 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) 01:36:34 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(0x0, r0) 01:36:34 executing program 0: unshare(0x2c020400) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0), 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 4: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(0x0, r0) 01:36:34 executing program 3: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e21, 0x5978000, @private1={0xfc, 0x1, '\x00', 0x1}, 0xbc9}, {0xa, 0x4e24, 0x1000, @rand_addr=' \x01\x00', 0x8}, 0x8, [0x80, 0x1, 0x0, 0x4, 0x8, 0x1, 0x1, 0x6]}, 0x5c) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) 01:36:34 executing program 0: unshare(0x2c020400) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0), 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 3: r0 = msgget$private(0x0, 0x0) unshare(0x0) r1 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) 01:36:34 executing program 4: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06bdc7444bb8991a582a36b2a185404e48e76b3767b24a6707de70ab2bc0677761996619beb9be21bb2692eb5122971e10fafa28a963667f3536d842d9ec358cdc054719c35acd32b7ec56104ba5de7e668c526d0c82b3e0ba45a202621d", 0x5e, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 0: unshare(0x2c020400) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, &(0x7f0000000500)) 01:36:34 executing program 3: r0 = msgget$private(0x0, 0x0) unshare(0x0) r1 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 4: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06", 0x1, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 3: r0 = msgget$private(0x0, 0x0) unshare(0x0) r1 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) 01:36:34 executing program 4: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0), 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 3: msgget$private(0x0, 0x0) unshare(0x0) r0 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r0, 0x0) 01:36:34 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0), 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 3: msgget$private(0x0, 0x0) unshare(0x0) msgctl$IPC_RMID(0x0, 0x0) 01:36:34 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) 01:36:34 executing program 4: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0), 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0), 0x0, 0x8}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 3: msgget$private(0x0, 0x0) unshare(0x0) msgctl$IPC_RMID(0x0, 0x0) 01:36:34 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06", 0x1}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 3: msgget$private(0x0, 0x0) unshare(0x0) msgctl$IPC_RMID(0x0, 0x0) 01:36:34 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06", 0x1}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) [ 889.348339][T15859] loop4: detected capacity change from 0 to 16383 01:36:34 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) 01:36:34 executing program 3: msgget$private(0x0, 0x0) r0 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r0, 0x0) 01:36:34 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x0) r1 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) 01:36:34 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:34 executing program 1: unshare(0x2c020400) syz_read_part_table(0x0, 0x4, &(0x7f0000000780)=[{&(0x7f00000003c0)="06", 0x1}, {&(0x7f0000000240)="d7", 0x1}, {&(0x7f0000000580)="9a4c", 0x2, 0xffffffffffffffff}, {&(0x7f0000000280)="c8", 0x1}]) 01:36:34 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x0) r1 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 2: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r1}]) 01:36:34 executing program 3: r0 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r0, 0x0) 01:36:34 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x1, &(0x7f0000000000)) 01:36:34 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:34 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:34 executing program 2: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:34 executing program 4: r0 = msgget$private(0x0, 0x0) unshare(0x0) r1 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r1, 0x0) msgctl$IPC_STAT(r0, 0xb, 0x0) 01:36:34 executing program 3: r0 = msgget(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:36:34 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) 01:36:34 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:34 executing program 0: unshare(0x2c020400) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) 01:36:34 executing program 4: msgget$private(0x0, 0x0) unshare(0x0) r0 = msgget(0x0, 0x2c0) msgctl$IPC_RMID(r0, 0x0) 01:36:34 executing program 3: r0 = msgget(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:36:35 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 4: msgget$private(0x0, 0x0) unshare(0x0) msgget(0x0, 0x2c0) 01:36:35 executing program 3: r0 = msgget(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) 01:36:35 executing program 0: unshare(0x2c020400) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 2: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 01:36:35 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 4: msgget$private(0x0, 0x0) msgget(0x0, 0x2c0) 01:36:35 executing program 1: unshare(0x2c020400) unshare(0x20000400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) 01:36:35 executing program 0: unshare(0x2c020400) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 3: msgget(0x0, 0x2c0) msgctl$IPC_RMID(0x0, 0x0) 01:36:35 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 4: msgget$private(0x0, 0x0) msgget(0x0, 0x2c0) 01:36:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 3: msgget(0x0, 0x2c0) msgctl$IPC_RMID(0x0, 0x0) 01:36:35 executing program 2: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 1: unshare(0x2c020400) unshare(0x20000400) 01:36:35 executing program 5: r0 = msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 4: msgget$private(0x0, 0x0) msgget(0x0, 0x2c0) 01:36:35 executing program 3: msgget(0x0, 0x2c0) msgctl$IPC_RMID(0x0, 0x0) 01:36:35 executing program 1: unshare(0x20000400) 01:36:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 5: r0 = msgget$private(0x0, 0x0) unshare(0x2c020400) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 4: unshare(0x0) msgget(0x0, 0x2c0) 01:36:35 executing program 2: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 0: unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 1: unshare(0x20000400) 01:36:35 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 4: unshare(0x0) msgget(0x0, 0x2c0) 01:36:35 executing program 1: unshare(0x20000400) 01:36:35 executing program 0: unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 5: unshare(0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 4: unshare(0x0) msgget(0x0, 0x2c0) 01:36:35 executing program 1: unshare(0x0) unshare(0x20000400) 01:36:35 executing program 2: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:35 executing program 0: unshare(0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 5: unshare(0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 4: msgget$private(0x0, 0x0) unshare(0x0) msgget(0x0, 0x0) 01:36:35 executing program 4: msgget$private(0x0, 0x0) unshare(0x0) msgget(0x0, 0x0) 01:36:35 executing program 1: unshare(0x0) unshare(0x20000400) 01:36:35 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 0: unshare(0x2c020400) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 5: unshare(0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:35 executing program 1: unshare(0x0) unshare(0x20000400) 01:36:35 executing program 4: msgget$private(0x0, 0x0) unshare(0x0) msgget(0x0, 0x0) 01:36:35 executing program 2: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:35 executing program 1: unshare(0x2c020400) unshare(0x0) 01:36:35 executing program 0: unshare(0x2c020400) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 4: r0 = msgget$private(0x0, 0x4) unshare(0x2c020400) msgget(0x2, 0x410) msgget$private(0x0, 0x71) r1 = msgget$private(0x0, 0x0) inotify_init1(0x800) inotify_init() r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x12200, 0x0) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x840}, 0x4004) r3 = gettid() ptrace$pokeuser(0x6, r3, 0x0, 0x0) ptrace$poke(0x4, r3, &(0x7f00000000c0), 0x8a0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/157) msgctl$IPC_STAT(r1, 0xb, 0x0) socket$inet6(0xa, 0x5, 0x4) msgget$private(0x0, 0x0) r4 = msgget(0x3, 0x20) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000300)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 01:36:35 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, 0x0) 01:36:35 executing program 1: unshare(0x2c020400) unshare(0x0) 01:36:35 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 0: unshare(0x2c020400) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x24, 0x0, 0x0) 01:36:35 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(0x0, 0x3, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000040)=0x6, 0x4) 01:36:35 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, 0x0) 01:36:35 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r3 = socket(0x2b, 0x800, 0xc696) r4 = accept$inet6(r3, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e24, 0x1, @mcast2, 0x2}, 0x3, [0x1, 0x2, 0x5, 0x7, 0x400, 0x4, 0x1, 0x20]}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f00000003c0)={{0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40}, {0xa, 0x4e20, 0xcd657f73, @remote, 0x2a7ce8cc}, 0x5e, [0xda5a, 0x6, 0x4, 0x9, 0x0, 0x3ff, 0x5b]}, 0x5c) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000080)=0x61e) 01:36:35 executing program 1: unshare(0x2c020400) unshare(0x0) 01:36:35 executing program 2: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:35 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, 0x0) 01:36:35 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:35 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 0: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r3 = socket(0x2b, 0x800, 0xc696) r4 = accept$inet6(r3, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e24, 0x1, @mcast2, 0x2}, 0x3, [0x1, 0x2, 0x5, 0x7, 0x400, 0x4, 0x1, 0x20]}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f00000003c0)={{0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40}, {0xa, 0x4e20, 0xcd657f73, @remote, 0x2a7ce8cc}, 0x5e, [0xda5a, 0x6, 0x4, 0x9, 0x0, 0x3ff, 0x5b]}, 0x5c) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000080)=0x61e) 01:36:35 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:35 executing program 2: msgget$private(0x0, 0x0) unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:35 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:35 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:35 executing program 1: unshare(0x6c020c80) r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x1, 0x10000) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) r1 = msgget$private(0x0, 0x51) msgsnd(r1, &(0x7f0000000040)={0x2, "37af4ab50407cc01192099200a4d81ee72"}, 0x19, 0x800) 01:36:35 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 0: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in=@local, @in=@remote, 0x4e22, 0x7, 0x4e22, 0x0, 0x2, 0x0, 0xa0, 0x87, 0x0, 0xee01}, {0xfffffffffffffffe, 0x5, 0x80000000, 0x0, 0x7f, 0xe3, 0xfffffffffffffff7, 0x6}, {0x0, 0x44b, 0x200, 0x400}, 0x2, 0x6e6bb5, 0x3, 0x1, 0x2}, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4d6, 0x32}, 0x2, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, 0x0, 0x4, 0x3, 0x9, 0x101, 0x7ff, 0x5}}, 0xe8) 01:36:35 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) 01:36:35 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r3 = socket(0x2b, 0x800, 0xc696) r4 = accept$inet6(r3, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e24, 0x1, @mcast2, 0x2}, 0x3, [0x1, 0x2, 0x5, 0x7, 0x400, 0x4, 0x1, 0x20]}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f00000003c0)={{0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40}, {0xa, 0x4e20, 0xcd657f73, @remote, 0x2a7ce8cc}, 0x5e, [0xda5a, 0x6, 0x4, 0x9, 0x0, 0x3ff, 0x5b]}, 0x5c) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000080)=0x61e) 01:36:35 executing program 1: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:35 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:35 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) 01:36:35 executing program 1: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:35 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:35 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:35 executing program 1: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:35 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r3 = socket(0x2b, 0x800, 0xc696) r4 = accept$inet6(r3, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) r5 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r5, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e24, 0x1, @mcast2, 0x2}, 0x3, [0x1, 0x2, 0x5, 0x7, 0x400, 0x4, 0x1, 0x20]}, 0x5c) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f00000003c0)={{0xa, 0x4e24, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}, 0x40}, {0xa, 0x4e20, 0xcd657f73, @remote, 0x2a7ce8cc}, 0x5e, [0xda5a, 0x6, 0x4, 0x9, 0x0, 0x3ff, 0x5b]}, 0x5c) 01:36:35 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:35 executing program 2: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:36 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:36 executing program 5: unshare(0x2c020400) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:36 executing program 1: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:36 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:36 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r3 = socket(0x2b, 0x800, 0xc696) accept$inet6(r3, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) r4 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e24, 0x0, @mcast2, 0x2}, {0xa, 0x4e24, 0x1, @mcast2, 0x2}, 0x3, [0x1, 0x2, 0x5, 0x7, 0x400, 0x4, 0x1, 0x20]}, 0x5c) 01:36:36 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:36 executing program 5: unshare(0x2c020400) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:36 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:36 executing program 2: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:36 executing program 1: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:36 executing program 0: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:36 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r3 = socket(0x2b, 0x800, 0xc696) accept$inet6(r3, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:36 executing program 5: unshare(0x2c020400) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:36 executing program 1: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:36 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:36 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:36 executing program 0: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) accept(r0, 0x0, &(0x7f0000000240)) 01:36:36 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r3 = socket(0x2b, 0x800, 0xc696) accept$inet6(r3, 0x0, &(0x7f0000000100)) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:36 executing program 1: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@rand_addr=' \x01\x00', 0x0, 0x2, 0x2, 0xb, 0x9, 0x3}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e22, 0x7ff5580e, @mcast2, 0x9}, {0xa, 0x4e24, 0x48000, @private1, 0x8}, 0x4, [0x1, 0x101, 0x3, 0x101, 0x9, 0x1, 0x6, 0x5]}, 0x5c) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x7ff, @private2, 0x5}, 0x1c) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$SG_EMULATED_HOST(r4, 0x2203, &(0x7f0000000040)) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000080)={@local}, 0x14) ioctl$RTC_IRQP_READ(r2, 0x8008700b, 0x0) getpeername$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) 01:36:36 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:36 executing program 2: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:36 executing program 0 (fault-call:1 fault-nth:0): unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:36 executing program 1 (fault-call:1 fault-nth:0): unshare(0x2c020400) unshare(0x20000400) 01:36:36 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:36 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) [ 890.937254][T16248] FAULT_INJECTION: forcing a failure. [ 890.937254][T16248] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 890.951754][T16248] CPU: 1 PID: 16248 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 890.960846][T16248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.971262][T16248] Call Trace: [ 890.974571][T16248] dump_stack+0x137/0x19d [ 890.978918][T16248] should_fail+0x23c/0x250 [ 890.983364][T16248] should_fail_usercopy+0x16/0x20 [ 890.987946][T16251] FAULT_INJECTION: forcing a failure. [ 890.987946][T16251] name failslab, interval 1, probability 0, space 0, times 0 [ 890.989476][T16248] _copy_to_user+0x1c/0x90 [ 891.007221][T16248] __se_sys_msgctl+0x366/0x3b0 [ 891.011991][T16248] ? ksys_write+0x148/0x180 [ 891.016566][T16248] ? fpregs_assert_state_consistent+0x7d/0x90 [ 891.022750][T16248] __x64_sys_msgctl+0x3f/0x50 [ 891.027543][T16248] do_syscall_64+0x4a/0x90 [ 891.032008][T16248] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 891.037953][T16248] RIP: 0033:0x4665d9 [ 891.041938][T16248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.061572][T16248] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000047 [ 891.069976][T16248] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 891.078042][T16248] RDX: 00000000200000c0 RSI: 0000000000000003 RDI: 0000000000000000 [ 891.086021][T16248] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 891.094084][T16248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.102193][T16248] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 [ 891.110442][T16251] CPU: 0 PID: 16251 Comm: syz-executor.1 Not tainted 5.13.0-rc5-syzkaller #0 [ 891.119334][T16251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.129488][T16251] Call Trace: [ 891.132772][T16251] dump_stack+0x137/0x19d 01:36:36 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:36 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) [ 891.137324][T16251] should_fail+0x23c/0x250 [ 891.141776][T16251] ? create_new_namespaces+0x3c/0x560 [ 891.147246][T16251] __should_failslab+0x81/0x90 [ 891.152094][T16251] should_failslab+0x5/0x20 [ 891.156603][T16251] kmem_cache_alloc+0x46/0x2f0 [ 891.161615][T16251] create_new_namespaces+0x3c/0x560 [ 891.167073][T16251] ? security_capable+0x91/0xa0 [ 891.172020][T16251] unshare_nsproxy_namespaces+0xe2/0x120 [ 891.177750][T16251] ksys_unshare+0x381/0x710 [ 891.182387][T16251] __x64_sys_unshare+0x1b/0x20 01:36:36 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r2 = socket(0x2b, 0x800, 0xc696) accept$inet6(r2, 0x0, &(0x7f0000000100)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:36 executing program 0 (fault-call:1 fault-nth:1): unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:36 executing program 5: unshare(0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) [ 891.187331][T16251] do_syscall_64+0x4a/0x90 [ 891.191779][T16251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 891.191808][T16251] RIP: 0033:0x4665d9 [ 891.191820][T16251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:36:36 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:36 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:36 executing program 1 (fault-call:1 fault-nth:1): unshare(0x2c020400) unshare(0x20000400) 01:36:36 executing program 0 (fault-call:1 fault-nth:2): unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) [ 891.191835][T16251] RSP: 002b:00007ff2588a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 891.191851][T16251] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:36:36 executing program 1: unshare(0x2c020400) unshare(0x20000400) 01:36:36 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:36 executing program 0 (fault-call:1 fault-nth:3): unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) [ 891.191864][T16251] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000400 [ 891.191874][T16251] RBP: 00007ff2588a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 891.191884][T16251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.191892][T16251] R13: 00007ffe7a88e78f R14: 00007ff2588a6300 R15: 0000000000022000 [ 891.255338][T16274] FAULT_INJECTION: forcing a failure. [ 891.255338][T16274] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 891.255416][T16274] CPU: 1 PID: 16274 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 891.255437][T16274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.255447][T16274] Call Trace: [ 891.255454][T16274] dump_stack+0x137/0x19d [ 891.255477][T16274] should_fail+0x23c/0x250 [ 891.255548][T16274] __alloc_pages+0x102/0x320 [ 891.255563][T16274] alloc_pages+0x21d/0x310 [ 891.255580][T16274] pte_alloc_one+0x29/0xb0 [ 891.255598][T16274] __pte_alloc+0x2f/0x210 [ 891.255618][T16274] do_anonymous_page+0x79b/0x8b0 [ 891.255641][T16274] handle_mm_fault+0x96f/0x1a70 [ 891.255686][T16274] do_user_addr_fault+0x60c/0xc00 [ 891.255700][T16274] exc_page_fault+0x94/0x230 [ 891.255740][T16274] asm_exc_page_fault+0x1e/0x30 [ 891.255761][T16274] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 891.255796][T16274] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 891.255813][T16274] RSP: 0018:ffffc90001babe10 EFLAGS: 00010202 [ 891.255830][T16274] RAX: ffff888108e1ca68 RBX: 0000000000000020 RCX: 0000000000000004 [ 891.255843][T16274] RDX: 0000000000000000 RSI: ffffc90001babe48 RDI: 00000000200000c0 [ 891.255854][T16274] RBP: 0000000000000000 R08: 000040000007d000 R09: 0001ffffffffffff [ 891.255866][T16274] R10: 0001c90001babe67 R11: ffff888108e1c080 R12: 00007ffffffff000 [ 891.255877][T16274] R13: 00000000200000e0 R14: ffffc90001babe48 R15: 00000000200000c0 [ 891.255891][T16274] _copy_to_user+0x77/0x90 [ 891.255990][T16274] __se_sys_msgctl+0x366/0x3b0 [ 891.256009][T16274] ? ksys_write+0x148/0x180 [ 891.256036][T16274] ? fpregs_assert_state_consistent+0x7d/0x90 [ 891.256058][T16274] __x64_sys_msgctl+0x3f/0x50 [ 891.256118][T16274] do_syscall_64+0x4a/0x90 [ 891.256137][T16274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 891.256158][T16274] RIP: 0033:0x4665d9 [ 891.256170][T16274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.256185][T16274] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000047 [ 891.256244][T16274] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 891.256253][T16274] RDX: 00000000200000c0 RSI: 0000000000000003 RDI: 0000000000000000 [ 891.256262][T16274] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 891.256273][T16274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.256287][T16274] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 [ 891.300080][T16287] FAULT_INJECTION: forcing a failure. [ 891.300080][T16287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 891.300101][T16287] CPU: 0 PID: 16287 Comm: syz-executor.1 Not tainted 5.13.0-rc5-syzkaller #0 [ 891.300187][T16287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.300198][T16287] Call Trace: [ 891.300205][T16287] dump_stack+0x137/0x19d [ 891.300230][T16287] should_fail+0x23c/0x250 [ 891.300249][T16287] should_fail_usercopy+0x16/0x20 [ 891.300341][T16287] _copy_to_user+0x1c/0x90 [ 891.300358][T16287] simple_read_from_buffer+0xab/0x120 [ 891.300381][T16287] proc_fail_nth_read+0xf6/0x140 [ 891.300401][T16287] ? rw_verify_area+0x136/0x250 [ 891.300424][T16287] ? proc_fault_inject_write+0x200/0x200 [ 891.300562][T16287] vfs_read+0x154/0x5d0 [ 891.300661][T16287] ? create_new_namespaces+0x4cd/0x560 [ 891.300720][T16287] ? security_capable+0x91/0xa0 [ 891.300742][T16287] ? __fget_light+0xd0/0x260 [ 891.300896][T16287] ksys_read+0xce/0x180 [ 891.300912][T16287] __x64_sys_read+0x3e/0x50 [ 891.300930][T16287] do_syscall_64+0x4a/0x90 [ 891.300946][T16287] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 891.301035][T16287] RIP: 0033:0x41935c [ 891.301046][T16287] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 891.301059][T16287] RSP: 002b:00007ff2588a6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 891.301073][T16287] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 891.301082][T16287] RDX: 000000000000000f RSI: 00007ff2588a61e0 RDI: 0000000000000003 [ 891.301092][T16287] RBP: 00007ff2588a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 891.301102][T16287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.301111][T16287] R13: 00007ffe7a88e78f R14: 00007ff2588a6300 R15: 0000000000022000 [ 891.331368][T16295] FAULT_INJECTION: forcing a failure. [ 891.331368][T16295] name failslab, interval 1, probability 0, space 0, times 0 [ 891.331393][T16295] CPU: 0 PID: 16295 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 891.331413][T16295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.331423][T16295] Call Trace: [ 891.331430][T16295] dump_stack+0x137/0x19d [ 891.331454][T16295] should_fail+0x23c/0x250 [ 891.331473][T16295] ? __anon_vma_prepare+0x41/0x2d0 [ 891.331494][T16295] __should_failslab+0x81/0x90 [ 891.331533][T16295] should_failslab+0x5/0x20 [ 891.331544][T16295] kmem_cache_alloc+0x46/0x2f0 [ 891.331621][T16295] ? pte_alloc_one+0x84/0xb0 [ 891.331639][T16295] __anon_vma_prepare+0x41/0x2d0 [ 891.331659][T16295] do_anonymous_page+0x7bc/0x8b0 [ 891.331682][T16295] handle_mm_fault+0x96f/0x1a70 [ 891.331705][T16295] do_user_addr_fault+0x60c/0xc00 [ 891.331772][T16295] exc_page_fault+0x94/0x230 [ 891.331790][T16295] asm_exc_page_fault+0x1e/0x30 [ 891.331806][T16295] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 891.331827][T16295] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 891.331851][T16295] RSP: 0018:ffffc90001b5fe10 EFLAGS: 00010202 [ 891.331866][T16295] RAX: ffff888100386a68 RBX: 0000000000000020 RCX: 0000000000000004 [ 891.331878][T16295] RDX: 0000000000000000 RSI: ffffc90001b5fe48 RDI: 00000000200000c0 [ 891.331890][T16295] RBP: 0000000000000000 R08: 000040000007d000 R09: 0001ffffffffffff [ 891.331903][T16295] R10: 0001c90001b5fe67 R11: 0000000000002000 R12: 00007ffffffff000 [ 891.331912][T16295] R13: 00000000200000e0 R14: ffffc90001b5fe48 R15: 00000000200000c0 [ 891.331922][T16295] _copy_to_user+0x77/0x90 [ 891.331961][T16295] __se_sys_msgctl+0x366/0x3b0 [ 891.331978][T16295] ? ksys_write+0x148/0x180 [ 891.331989][T16295] ? fpregs_assert_state_consistent+0x7d/0x90 [ 891.332026][T16295] __x64_sys_msgctl+0x3f/0x50 [ 891.332044][T16295] do_syscall_64+0x4a/0x90 [ 891.332063][T16295] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 891.332084][T16295] RIP: 0033:0x4665d9 [ 891.332093][T16295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.332156][T16295] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000047 [ 891.332171][T16295] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 891.332180][T16295] RDX: 00000000200000c0 RSI: 0000000000000003 RDI: 0000000000000000 [ 891.332189][T16295] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 891.332197][T16295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.332205][T16295] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 [ 891.386644][T16306] FAULT_INJECTION: forcing a failure. [ 891.386644][T16306] name failslab, interval 1, probability 0, space 0, times 0 [ 892.148412][T16306] CPU: 1 PID: 16306 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 892.148428][T16306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.148491][T16306] Call Trace: [ 892.148496][T16306] dump_stack+0x137/0x19d [ 892.148512][T16306] should_fail+0x23c/0x250 [ 892.148523][T16306] ? __anon_vma_prepare+0x92/0x2d0 [ 892.148536][T16306] __should_failslab+0x81/0x90 [ 892.148550][T16306] should_failslab+0x5/0x20 [ 892.148560][T16306] kmem_cache_alloc+0x46/0x2f0 [ 892.148594][T16306] ? __anon_vma_prepare+0x41/0x2d0 [ 892.148606][T16306] __anon_vma_prepare+0x92/0x2d0 [ 892.148622][T16306] do_anonymous_page+0x7bc/0x8b0 [ 892.148637][T16306] handle_mm_fault+0x96f/0x1a70 [ 892.148652][T16306] do_user_addr_fault+0x60c/0xc00 [ 892.148663][T16306] exc_page_fault+0x94/0x230 [ 892.148711][T16306] asm_exc_page_fault+0x1e/0x30 [ 892.148725][T16306] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 892.148748][T16306] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 892.148764][T16306] RSP: 0018:ffffc90001c9fe10 EFLAGS: 00010202 [ 892.148779][T16306] RAX: ffff888100959a68 RBX: 0000000000000020 RCX: 0000000000000004 [ 892.148791][T16306] RDX: 0000000000000000 RSI: ffffc90001c9fe48 RDI: 00000000200000c0 [ 892.148800][T16306] RBP: 0000000000000000 R08: 000040000007d000 R09: 0001ffffffffffff [ 892.148809][T16306] R10: 0001c90001c9fe67 R11: ffff888100959080 R12: 00007ffffffff000 [ 892.148820][T16306] R13: 00000000200000e0 R14: ffffc90001c9fe48 R15: 00000000200000c0 [ 892.306916][T16306] _copy_to_user+0x77/0x90 [ 892.311340][T16306] __se_sys_msgctl+0x366/0x3b0 [ 892.316106][T16306] ? ksys_write+0x148/0x180 [ 892.320611][T16306] ? fpregs_assert_state_consistent+0x7d/0x90 [ 892.326834][T16306] __x64_sys_msgctl+0x3f/0x50 [ 892.331517][T16306] do_syscall_64+0x4a/0x90 [ 892.335971][T16306] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 892.342331][T16306] RIP: 0033:0x4665d9 [ 892.346313][T16306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 892.366326][T16306] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000047 [ 892.374747][T16306] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 892.382710][T16306] RDX: 00000000200000c0 RSI: 0000000000000003 RDI: 0000000000000000 [ 892.392033][T16306] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 892.400249][T16306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 892.408277][T16306] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 01:36:37 executing program 3: msgget$private(0x0, 0x0) memfd_create(&(0x7f0000000040)='}}[\xbb\x00', 0x1) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:37 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(0x0, 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:37 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) r2 = socket(0x2b, 0x800, 0xc696) accept$inet6(r2, 0x0, &(0x7f0000000100)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:37 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:37 executing program 1: unshare(0x2c020400) unshare(0x10040180) 01:36:37 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:37 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:37 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x2, &(0x7f00000000c0)=""/166) 01:36:37 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) socket(0x2b, 0x800, 0xc696) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:37 executing program 1: unshare(0x20000400) 01:36:37 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:37 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x4, &(0x7f00000000c0)=""/166) 01:36:37 executing program 3: msgget$private(0x0, 0x0) unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:37 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:37 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/rcu_normal', 0x4400, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) unshare(0x2c030480) unshare(0x20000400) 01:36:37 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:37 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:37 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0xb, &(0x7f00000000c0)=""/166) 01:36:38 executing program 1: unshare(0x2c020400) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x0, 0x400, 0x8000, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_ADDR={0x20, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x6427f2aa67decf6f}, 0x220000c0) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000200)={0x0, 0x11, '\x00', [@jumbo={0xc2, 0x4, 0x8000}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x28}}}, @ra, @generic={0xbb, 0x6a, "88978d033170c96a9759a60381cca457af7f3a5ffb50304fdb73a03e4567c23d84743d1e31116df74e205fe1b4b762f5934b3e6a737cf114db56c445b27e9f9e9469fd706da199d4642ef8ad5f3cc5877d628ad8a9b1ece58d9fdf5a3aa15a97804bd1c71951ebfa0261"}, @ra={0x5, 0x2, 0x8}]}, 0x98) unshare(0x20000400) unshare(0x10040400) 01:36:38 executing program 5: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:38 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0xc, &(0x7f00000000c0)=""/166) 01:36:38 executing program 5: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:38 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0xd, &(0x7f00000000c0)=""/166) 01:36:38 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 1: unshare(0x20070500) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280), 0x5, 0x18042) ioctl$RTC_UIE_ON(r2, 0x7003) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000000)={0x33, 0x1, '\x00', [@generic={0x65, 0x3, '[y0'}, @enc_lim={0x4, 0x1, 0x80}]}, 0x10) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@dev}, &(0x7f0000000180)=0x14) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/software_nodes', 0xc0, 0x3) syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), r4) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)={0x7, {{0xa, 0x4e22, 0xc0, @dev={0xfe, 0x80, '\x00', 0x38}, 0x5}}, 0x0, 0x3, [{{0xa, 0x4e24, 0x6, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7fffffff}}, {{0xa, 0x4e20, 0x0, @empty, 0x8}}, {{0xa, 0x4e20, 0x84d2, @mcast1, 0xffff}}]}, 0x210) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r1) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6840263e561efc61ccfa4ecacec0fd944130773b8ac46f", @ANYRES16=r5, @ANYBLOB="000128bd7000fedbdf2502000000"], 0x14}}, 0x4008000) unshare(0x20000400) getgid() 01:36:38 executing program 5: unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) 01:36:38 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 0: unshare(0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, &(0x7f0000000080)) 01:36:38 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 3: unshare(0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 1: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100040}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r0, 0x108, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x8014) unshare(0x40500) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x13, 0x161c80) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e20, 0x3ff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, {0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00', 0x5}, 0x1f, [0x441c, 0x7fffffff, 0x20, 0x400, 0x3, 0xbd, 0x20, 0x7]}, 0x5c) unshare(0x16060c00) 01:36:38 executing program 5: unshare(0x2c020400) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, 0x0, 0x0) 01:36:38 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000126bd7000fcdbdf251100000008000400010001000c000180060004004e20000040000380050008000100000014000200766c616e300000000000000000000000080003000100000006000400ff0f0000060007004e24000006000400000400000800050004000000"], 0x70}, 0x1, 0x0, 0x0, 0x51}, 0x50004) io_setup(0x6, &(0x7f0000000c80)=0x0) io_getevents(r1, 0x10000, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) io_cancel(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x8, 0x6, r2, &(0x7f0000000340)="7293c6d7c75427b14920b32726e587b4c444e96285fa6bcc2a483ca912a5dda29d0ed0f66fb84b0fe25add3b45e3f8c8cda0af4a4b7ee6e0024cea861b96bb391320670905328dafb6d6a8fd57aa689b81eeab3264325a8cf479954cab707a4fca6788b0ea57ba", 0x67, 0xffffffff, 0x0, 0x1, r0}, &(0x7f0000000400)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) msgget$private(0x0, 0x0) r3 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) r4 = gettid() msgctl$IPC_SET(r3, 0x1, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x166c, 0x0, 0x2002, 0x0, 0x5, 0x0, 0x0, r4}) r5 = msgget$private(0x0, 0x40) r6 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}) msgctl$MSG_INFO(r5, 0xc, &(0x7f00000000c0)=""/78) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000000000)=""/166) 01:36:38 executing program 5: unshare(0x20070500) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000280), 0x5, 0x18042) ioctl$RTC_UIE_ON(r2, 0x7003) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f0000000000)={0x33, 0x1, '\x00', [@generic={0x65, 0x3, '[y0'}, @enc_lim={0x4, 0x1, 0x80}]}, 0x10) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@dev}, &(0x7f0000000180)=0x14) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/software_nodes', 0xc0, 0x3) syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), r4) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000380)={0x7, {{0xa, 0x4e22, 0xc0, @dev={0xfe, 0x80, '\x00', 0x38}, 0x5}}, 0x0, 0x3, [{{0xa, 0x4e24, 0x6, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7fffffff}}, {{0xa, 0x4e20, 0x0, @empty, 0x8}}, {{0xa, 0x4e20, 0x84d2, @mcast1, 0xffff}}]}, 0x210) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r1) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6840263e561efc61ccfa4ecacec0fd944130773b8ac46f", @ANYRES16=r5, @ANYBLOB="000128bd7000fedbdf2502000000"], 0x14}}, 0x4008000) unshare(0x20000400) getgid() 01:36:38 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 3: unshare(0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 5: r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100040}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r0, 0x108, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x8014) unshare(0x40500) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x13, 0x161c80) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e20, 0x3ff, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, {0xa, 0x4e22, 0x3, @rand_addr=' \x01\x00', 0x5}, 0x1f, [0x441c, 0x7fffffff, 0x20, 0x400, 0x3, 0xbd, 0x20, 0x7]}, 0x5c) unshare(0x16060c00) 01:36:38 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 1: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast1, 0x0}, &(0x7f00000000c0)=0x14) r2 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast1, @in=@multicast1, 0x4e22, 0x1, 0x4e24, 0x0, 0xa, 0x20, 0x80, 0x3a, r1, r2}, {0x0, 0xff, 0x40, 0x8, 0x8, 0x3, 0x4}, {0xff, 0xffff, 0x2, 0x857}, 0x1, 0x6e6bba, 0x2, 0x0, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x31}, 0x4d2, 0x32}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x4, 0x3, 0x1, 0x3f, 0x88, 0x4}}, 0xe8) unshare(0xa020000) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgget(0x1, 0x4acd545bfa719c7d) 01:36:38 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB="320d000000000000b64347a2bd1b049d3cc0fb7ec85e0efefad204894af652224482bc308f2d8a044fbb3d8130cf24566438722b862f232c280c5e819b085e99675adf946f0b3d9194c90a6178c91020010000000000000000000000000001c910000000000000000000000000000000010001000000132c"], 0x78) 01:36:38 executing program 3: unshare(0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 1: unshare(0x2c020400) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000000)) unshare(0x20000400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast1, 0x0}, &(0x7f00000000c0)=0x14) r2 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast1, @in=@multicast1, 0x4e22, 0x1, 0x4e24, 0x0, 0xa, 0x20, 0x80, 0x3a, r1, r2}, {0x0, 0xff, 0x40, 0x8, 0x8, 0x3, 0x4}, {0xff, 0xffff, 0x2, 0x857}, 0x1, 0x6e6bba, 0x2, 0x0, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x31}, 0x4d2, 0x32}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x4, 0x3, 0x1, 0x3f, 0x88, 0x4}}, 0xe8) unshare(0xa020000) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) unshare(0x2c030000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r6 = getpid() sched_setaffinity(r6, 0x8, &(0x7f0000000300)=0x1) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast1, 0x0}, &(0x7f00000000c0)=0x14) r2 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast1, @in=@multicast1, 0x4e22, 0x1, 0x4e24, 0x0, 0xa, 0x20, 0x80, 0x3a, r1, r2}, {0x0, 0xff, 0x40, 0x8, 0x8, 0x3, 0x4}, {0xff, 0xffff, 0x2, 0x857}, 0x1, 0x6e6bba, 0x2, 0x0, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x31}, 0x4d2, 0x32}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x4, 0x3, 0x1, 0x3f, 0x88, 0x4}}, 0xe8) unshare(0xa020000) 01:36:38 executing program 3: unshare(0x2c020400) io_setup(0x0, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(0x0, 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 1: unshare(0x2c020400) unshare(0x20000400) unshare(0x400) 01:36:38 executing program 4: unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 0: r0 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000000) inotify_rm_watch(0xffffffffffffffff, r0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000140)={0x13, 0x21, 0x1, 0x1, 0x8, 0x80000000, 0x6, 0xc5, 0x1}) inotify_init() pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) inotify_rm_watch(r3, r0) unshare(0x2c020400) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r4) unshare(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x0, @mcast2, 0x1}, {0xa, 0x4e23, 0x2, @loopback, 0x1}, 0x100, [0x2, 0x1, 0x6, 0x1, 0x7, 0x80000000, 0xffffffff, 0xfff]}, 0x5c) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) r6 = inotify_add_watch(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x10000010) inotify_rm_watch(r5, r6) 01:36:38 executing program 1: setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000000)={0x7ff, {{0xa, 0x4e23, 0x1000, @dev={0xfe, 0x80, '\x00', 0x21}, 0x5}}}, 0x88) unshare(0x2c020400) unshare(0x7b720e99f12a1c63) unshare(0x38020000) 01:36:38 executing program 3: unshare(0x2c020400) io_setup(0x0, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 4: unshare(0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast1, 0x0}, &(0x7f00000000c0)=0x14) r2 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast1, @in=@multicast1, 0x4e22, 0x1, 0x4e24, 0x0, 0xa, 0x20, 0x80, 0x3a, r1, r2}, {0x0, 0xff, 0x40, 0x8, 0x8, 0x3, 0x4}, {0xff, 0xffff, 0x2, 0x857}, 0x1, 0x6e6bba, 0x2, 0x0, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x31}, 0x4d2, 0x32}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3500, 0x4, 0x3, 0x1, 0x3f, 0x88, 0x4}}, 0xe8) unshare(0xa020000) 01:36:38 executing program 1: unshare(0x2c020400) unshare(0x10000400) unshare(0x20000400) 01:36:38 executing program 0: unshare(0x2c020400) unshare(0x36010200) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(0x0, 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 3: unshare(0x2c020400) io_setup(0x0, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 4: unshare(0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) geteuid() unshare(0xa020000) 01:36:38 executing program 1: unshare(0x2c020400) unshare(0x20000400) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000080)={'syztnl1\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x2b, 0x2, 0x1, 0x1, 0x9, @rand_addr=' \x01\x00', @remote, 0x20, 0x8000, 0x7cb, 0x1}}) 01:36:38 executing program 3: unshare(0x2c020400) io_setup(0x1, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 4: unshare(0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:38 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) io_destroy(0x0) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008000}, 0x48015) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) unshare(0xa020000) 01:36:38 executing program 1: unshare(0x2c020400) unshare(0x26050580) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(0x0, 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 3: unshare(0x2c020400) io_setup(0x1, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 4: unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) 01:36:38 executing program 1: unshare(0x2c020400) unshare(0x20000000) unshare(0x20000400) unshare(0x1000200) times(&(0x7f0000000000)) syz_read_part_table(0x100, 0x5, &(0x7f0000001300)=[{&(0x7f0000000040)="5b6af2161258f96d6c6d8f25ce75e88426a4bf7f14cd5df6a8a1ca169c722f1f403e01202e9cdc7ed8dd0503b197640c30bf0ac775bedd04fc3db30fe58e3e65a46f12b86bcdad4b76d7497b74c70d036ada158f6786c17becd77622ec0f37d5d95d0925b6ce8b68ec9f660a9f93f2593c3dfcc88b9f26fe150d0fb0560824e08a05e2b73f77b3cd099de82a52bf400e7b39d489eb41a479de5dedaedc81334fc697953521ece37105229cb6b6c51eda16e17aed132b1db7fda2e029fbe43221030254ac7b4e36454661ad0f2f86f65b0e93a5e99429fb7bfd", 0xd9, 0x7ff}, {&(0x7f0000000140)="78f6cafd6df296e7eb87b4fc6cdb383fcce94df45089741b64d4614570fa0a0597cc3fe50bede90f667da977b2a69effa830d058b7cc16d077eaeffaef38d1a2dfe528cb2e02be3679c4fdffe6f241b0ddda7ec155f7f30fcb39c1777c260280962775cd66132771a7ad4955b9d5f3adcd9389c2d4fcb7221d2a119eec382a6afd358dcaa199e3657dec40341dbad114b4db5d7e08b477a3187a66a5b9d4fb63ac9cf3150c2219da2e07bb2954c82e548c16c591ca0239382f2642f34ae3d1e18b1fba05a9952dddd6927585ef23260b851c1a25638b54b542901c1b6b8e78810cd3b4e156d06d6e1e82632764fa8716ca015d1c58cfbec4b2577fcc2d14111771b80f46271458857c31c7aee8aa35276caff3504e4c7704ff0c30ef28afc1454c0ca73fafbf0a38ded13eb56bb947e2c44b255b0892f97d7892a28f3ded0da9e42c5c7d74950c33d705f832a83589125cc58ae0908fb8ba8b064b7f9acd71632fb06435099d60ffaedde671cc401ca5f68333dfccc5256a13e2d49d2e1540e6c4dfeb8230416a4748eb9ffa2212ddeaea1203ebc1493aae7c195f6f545df8d335e27839fde1927da6c912cab1ea93062b225bd11a0960cde91495f98ff937410cf7e372dd40da82b3a3ed50f7b5bde771f3a57b81966ca300c2a1ac5bc8812f303ceba58e502bbabfe1240f74a7cc744a9873dbdf6cdd7d1f748a8708ee006ace097910e9626da7ef0417bfdaa84de6a05cf9b3c00571463359b3fbfeaf42ca5c8e9bd6c1546e14bab5d24fc93f913c335f38c5f7ad61eb61dab571d66fbc9c8f40995ca04ef4a68da81899ea4b81b292785658f972f3bd1476b5d5484e9b020927c3f7d32777a4414002b75bd30d3e4c7da4b5be7eb9c5d40f22576cd646b37236693fcdb6d48be7bd5a8643cc14e8169438a34f4611e23137e58f33f3b5bccf13dd32ed7f80b4737a194662960ed6adb4a3cd31f0f15db668418ef1b36a292ea1f0c1e4417b077a32694fce82a605d495bab86f9562f7acc542da89211fbb1dfebd471565fce99041f7bf672ddd360a8ebbf45906f343352687dde4700b79113ead7ffef9460c85da9edf4f37428d80939b4313229a9ccd32f862a2ac89d8065b62a249ede347d8a8dea21e24bac8e677b4ff621609b1a4d7d13dde42c09e10e8408e95651b806dc501196c5e86869dec5df22c5f13a6fd0d7446adfc62f26aa1bf7d6c52f76feedc249e807d7608b1fc7712434a2b77b1722f2b671d19594bf4bd5475c9b6979613c58e10b3b80bfe989272d1c6344c1d894c97745175f9147212ad385b79e8e72a6a8ec4bd06118259f36ec2a6390cbabefab314d4f93d8712e9ad6b92f0a03a9cda0dce0e5961ac6180bc8709ac8ee94fd098650e686be5c017eaf9d9ddaae24cbf65ed660b09cd20e97e914f137903efb14c1c6000131882c7b8d5eb839a0d47f139c77777369b6c0fc7895ec630201bd32ed887784e8564067883eda54d40bb83ef176093faccacd7e438b590e40a79543a6ba053eb04d21c434f8dd1c993c8e746e5aab70b3683c320fa73e23bf4f84d0a086dc8548f17fd4654990703ab15cc4feefae3034f64557f83dd982bc8a2d7234dc247d2974dd33966b25fe52c83c1f96af8594cb983b9b401d6b418714b859bfecd50484b98f433c1c56cc1f5362336e3f60408716aca0b1f2b198e5f9d00b3dd60bf0f394550c795394a7b4cbd765587211246bb2cc8a82b2457c5b05df446e414c1cb9716a14d735b94944b44d6146579f77fff1d6366310bbb0fe1c8dbf259a323da1daa52d6fd120486f31c3613e22b36aec7bc50f9a9c7493a024fd6e3ed32a0a5d78c2ef309046541638a6ba2b07f8c4de43f1c750ee5e4521283960c11371bb0f989f3ec49349f20250238bb6748d65e79bfc6764943d106ef1aa6cbb6f023c849e403c1194180681593d79c414bfa49e82a5a1169ef36d435a3786ffb77d3e95eb1069e6c672570d4a744f647088a2e4a4b4d354f6f6304bdfdc19f3b2b976934fa114f191d5622dd7365f1fa8453ee35a88b2193d46c6ace697cd03346e96eaa31e8375e179a086a843c80305368710cb0579412c0b1fbee7ce8dd72a07a5e3a78803d71e1bbedd875eb04f99d20c0632a887213a7a8b21e97db4b65db720cf112ca9bc2abf4a3394c57a0b05fb5a5341018147d371fbe45eed04ae8db68bdc0b16abb8b9a6783d7dc5ca4f146944d075749b5fdb6924f903322d0b119eb710dfb2a164feb8fc79ed2e883731d41e8d1e207853b5cada210d64e551b685befe041789c62cddddf4ee0546e422d26bf3558ab8c20e071a083e9c1b024b99a7fadeea3ddfe0e3d7790b8938fd08e729f9535953f54fd4b30ea29e1af969af38f00678e9cc32039f6cda443a74af236ceedf81a0cc3fc594b1a2a7d6d5ec2d9e30533efdfbb9ad8177f9bb86bcb164938d3ffb06c14f64263aa42a789437826ffbfe0e9be4671a6dd7fb07552d6ccec33e1f32d821326fa2d395e11e9d14ae56b59585d4a387f699de941cebf4169e3e477bc1ee9c6db3a53403aff34006f6feeeb85d8ae4ec7b36c7bbb44576cfb2124e9885995e0e35f17e1cb2241b9b2122c64a8a5bc11914ade936747884aa898eb8f71625c210bfa71907ac5412797f85e9323b9059740e3a1bf46ea3080521623ac313b2263ab07df2e24c341a1e3d3fe4b644cb5918521d42aee8b7230b0077ebfc964b1c2e3604ffa26c5a5c7eb3f6b298922de73f41e703223e449f86df86d4fc6ddd7df94272811736ffa976ebb80b2f0ba344d43656edff2c7beb8590bc20e5f4458cff26f0dbaf70bb3e29e00a8e9d99e1dd33a67160bef38ee92cda7704b0c16392eaa7563db4050b17e6e35212df34247a06a48d7a19e4f0b6e25381a14e47af01ea4ea3706661102052ad88e155ff37c0061e4a5d77cba308869e07b9e4219ea6fffc2a1e86399b6f7e7595c9d6ac6cb779cd0388cccd01cded9737556ed1ab963b94469766fb2ac63bcb48afd590c240715ae34bee71a75a1dc3c2c6eac38363cb7fe288f8f91d30ce910d7d416ecc6bcca2fdebc8bc9b4883531da55941a496b24d5b2074dbf3d8b1c221479eae0b39c52abff22e3aa39c208d4104e310e5e3b21972e47807800b1545dd9aec76240a5bc73760965e2b228be2df1d95e7dda14bfe3e858a0a3eb7853d9b9b0b13c43670c69ffc64e87db42553e95de7f18f31a1e6a5240ed9ecf89855ca8d7d9a8d95a67a142081fe79aa4b53c221948000544f9b663021e0caece48083d4d04c4358af7bb69d3bfd1dc194e63ab8dc6cc087343c48ee77f06fda8ae699f5c8800605b15dd42515eb66f83e41b3b4fcbeddaf171c909969eb6a267c445ccceb3375238cc562eaa452ef31647a12b471b43d3004169ef6ebd1c1be410ca28b2465a87feef237ae3d4e6fdce2e0ef9602eacccaa1be111aadfcc83679a619582fb502bdbb60269194fd509e52407b186dc4601be97c43b79e725d1d0ba6667340736a69e1ec2567532b1f953c878090ae9eac6ecac9ca19bcca78495fbbc795525130f6036940ed7e312d39c7fd198821562ff27c75c64258cf34ec682c1681e005e8ce7388f9c752436973c81f2ab6fb5b1886d818fb2b678197f086035ee13d47d4e49a9689555c9ddc508da0a169d925c9328f9047661de73b47b19f74d852ce39f43db5ad07d206d99cb501fb4ab72c12e0bd179b882a11034ddb805482e92128d443a496aa8e6a925c79fde5ab048a356f722045d94bc47341eeed5b68b3b984434e4e6416c28eda484c58c696bcc31c987c0910bde7d8adde4288aab6426f923687a536edd7afbaa5ddb10b8829db4b4e5201f79d9cbfc39c59aaf040a93004e176ccb8223945cc6ad0de7d5136c3e735d9c4652e60705bee263a04c1ff7b0a6901c8b582c65812fbac6d5110d706f7f3336e89c5b96209eefbf944b8362c8ff52d2c77e48d0c5b5569a920f992d5e99ad7f67d71dee25e8eb995ba173d2f65644e0f89918992a413d36510e4c91ae920d2c92c036f8b55618e193bbc8dad5c49f91f9cbc4e9bab609baafd6cc9d1ffdbead2d9abd1ceff71e28f9f78d544b1b96ac1481d76a3cb4ea19db1f912e985687fb9d4c89b595786ecfdd2c5e757e2e4db28cd71d65986183819a637c57430c87f973cec073269653ed65e8f16c2d8cdf6402e26a94ec0ec2ff63da765100eb953284ea0c941c626ea3a7df6bb9f0ed813c4ec9be08bf128167c6f6204e660190805c394040af41d67836991c6ef43c6381172a26cc05d4ecf15c007bcbc35ac2722d3537f8e9e9ca1c5c570d5e9c4a35369f02eb319f06c3f7701b27c9648796170e40666da19670bd02c717cfd3fdb870d6dc09cee778b064a3658b5d98e203e1829365bf1ec03cf9afa7345fa00fc8a13a69a448cc52d6e97916d02adafc8cfcf61e57b7378138cb22cdd72b2a07364d4aa3bff4b32c7811d468ac3fdcb99d265fcbfaf1ea44141f08eff30e7ce100f090f315677a9d5278e67abebb08a6275229eeb6901a147a7acf1f8f60f786e7e2c9f0ee2e0cf1e673a2105ab29b385e581d85847ac9cac6c748916c89df4525df9d2dd0b6bae3024dfd58280f0fe70f859ae286063cde01571d5131b8929be577c1c8612de4340663e1a1654d387bfdf48cf5a7b1aaeafc769cc12774ef2cd516e00baf33a346c4dad4def5c113816b54af79cde76b65a172fb7bae28187bf4619a32d5c2334fa45792163356433199ffc3bce40f8ccadb50b0c35c3b0428fe8e3aaef9e7efd886120bbd17a4dfd445b13d96ffc5e7bc116b34fd78992a2ccf537a3eef1d6d8e1ccadabbfb36c5d8869d256791e5dc9fc6d4b3473aa295219a96bf78642433277b662e5480a1a18a0e92b0c6eccbbe927ee534ae55947fa838201dedd7704623ce29519bbdaf5db534157c870ddd252b19e06a2f65a6ce31e572daf5f0c02fb4e4a2e6dac005e06740c32b26e2652e28b3e0795ccda63d5d9a9c5db7481f68bf609bba9aa975c51a955845813b87c338216b4bd20d92da17df00d7f78a94bf6cea5f501313285f855f5a00eda0cc9612ea6bb93f98e5ae94bdb91e6e818df9eccc67691cc91529a8fc509ada7284040ac8daf1ae842792a6b2b12ae988e9e379bb38512b8e2096c69b2cc472a7e2d0b9f4e26a181bb4ef140ae5b328c89fcbabb381865cc6dd20c144de94e0ab90b4dd4b1e92f28bcf337d485c7a2e36795d8d0369393ea5d38599021c2a253782e46f212a0d63b421b1692b49fb540fb91d947cf8fc05d92f910ba42f3f75a50ff17eeef1f728c7e7b694037eb83b7bc10a9e3ced48176f425f6c57443dd4e6da0543d3ed91dae93ce6e057d1b7418e5c0280a1995b3817d64d65afc38a13486233e23a2fba4afaa0fcacfc5f4933af4879aaabc37ca685a8cb3870fd855b71545f863433f0bd9cf26d8564fc87d0a35aaf995fe8c4e14ea8cdbe19589ba475bd6bfa43eab99ad55cb00f1fbe19fc0857b80a6da97b57fbbda3909b3fa6d19b33d3dfef58fa78a07e4d6cdc7c3774a54a299493c9c15fda2e355a69ba5e811033046c1daffd3484de591423de1069a3dfe05835de34c548ce00cd7c0b185e3dc24439deb42c967aa9fc84283dcb230c275b6b812ce7250793f5f61b69dffb19f7752f00b1f5759e035c615e1f6d2e93129e0d49c9acf25e8cbf3c3128e64a205761d072ef3583ba0463f90216bca2f9190280a90241127c8ac6f4720798a30c4cef8166d548b0", 0x1000, 0x7}, {&(0x7f0000001140)="62848e86020c8bcb77f9585530c278e65611d573928a15f3e24c53d9b0aa4bf2761ca00844281b0db1c27c59ae498f236a35d1826379d94492888c05685b760fe4c3dd7dcb96fd84620f9a76456864405484cb8fda76b97c88ead6d58290723631665b9fbd3e406b0da1ff03acc6dc69d7403c5c13004d09594588c3f3138828df0f0a1fd1d386cbc749ae875564bdb983eea7eaa833278cb9eddb75b37ea6f5a147203cff722fe0bbb7117097b0ecaf73", 0xb1, 0xfffffffffffffffe}, {&(0x7f0000001200)="d9f7a7", 0x3, 0xfffffffffffffff9}, {&(0x7f0000001240)="29b1860dbc52bfc5a03ff30019bf47efe92cdbbc38c191090899ab571cc47ee46539ac2eda563f9e66162c3bf425dd8923aab766f6332df4f23e6e5ca85c2ae16b7a62da21df5fa223b5c6425671750d75f304b3925fafec58af7bb461181b73b080d32d6224acbf30f5e81fd85121e4dc31baf5f7eda95db08000d0b2c6385224fcd4125c68d5f1b42ce68a5746f7c0b7fb50487f030c4772a4b198f09dfd763b9e", 0xa2, 0x1ff}]) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) unshare(0xa020000) 01:36:38 executing program 0: unshare(0x2c020400) r0 = gettid() sched_rr_get_interval(r0, &(0x7f0000000080)) r1 = msgget(0x0, 0x40) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/111) 01:36:38 executing program 4: unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0xa020000) 01:36:38 executing program 1: unshare(0x2c020400) unshare(0x68040c00) 01:36:38 executing program 3: unshare(0x2c020400) io_setup(0x1, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:38 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x2) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e24, 0x2, @mcast1, 0x400}, {0xa, 0x4e20, 0xf878, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x8}, 0x93, [0x70, 0x7ff, 0x5, 0x845, 0x8, 0x40000000, 0xffff, 0x9]}, 0x5c) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@private2, @in=@remote}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000280)={{0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x81}, {0xa, 0x4e24, 0x6, @private2, 0x5}, 0x9, [0x2, 0x0, 0x6, 0x2, 0x8, 0x1, 0x33d, 0x2]}, 0x5c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000440)={0x11, 0x1, '\x00', [@jumbo={0xc2, 0x4, 0x7ff}, @padn={0x1, 0x2, [0x0, 0x0]}]}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x54, 0x0, 0x300, 0x70bd26, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x11}, 0x48000) 01:36:38 executing program 4: unshare(0x2c020400) unshare(0x20000000) unshare(0x20000400) unshare(0x1000200) times(&(0x7f0000000000)) syz_read_part_table(0x100, 0x5, &(0x7f0000001300)=[{&(0x7f0000000040)="5b6af2161258f96d6c6d8f25ce75e88426a4bf7f14cd5df6a8a1ca169c722f1f403e01202e9cdc7ed8dd0503b197640c30bf0ac775bedd04fc3db30fe58e3e65a46f12b86bcdad4b76d7497b74c70d036ada158f6786c17becd77622ec0f37d5d95d0925b6ce8b68ec9f660a9f93f2593c3dfcc88b9f26fe150d0fb0560824e08a05e2b73f77b3cd099de82a52bf400e7b39d489eb41a479de5dedaedc81334fc697953521ece37105229cb6b6c51eda16e17aed132b1db7fda2e029fbe43221030254ac7b4e36454661ad0f2f86f65b0e93a5e99429fb7bfd", 0xd9, 0x7ff}, {&(0x7f0000000140)="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", 0x1000, 0x7}, {&(0x7f0000001140)="62848e86020c8bcb77f9585530c278e65611d573928a15f3e24c53d9b0aa4bf2761ca00844281b0db1c27c59ae498f236a35d1826379d94492888c05685b760fe4c3dd7dcb96fd84620f9a76456864405484cb8fda76b97c88ead6d58290723631665b9fbd3e406b0da1ff03acc6dc69d7403c5c13004d09594588c3f3138828df0f0a1fd1d386cbc749ae875564bdb983eea7eaa833278cb9eddb75b37ea6f5a147203cff722fe0bbb7117097b0ecaf73", 0xb1, 0xfffffffffffffffe}, {&(0x7f0000001200)="d9f7a7", 0x3, 0xfffffffffffffff9}, {&(0x7f0000001240)="29b1860dbc52bfc5a03ff30019bf47efe92cdbbc38c191090899ab571cc47ee46539ac2eda563f9e66162c3bf425dd8923aab766f6332df4f23e6e5ca85c2ae16b7a62da21df5fa223b5c6425671750d75f304b3925fafec58af7bb461181b73b080d32d6224acbf30f5e81fd85121e4dc31baf5f7eda95db08000d0b2c6385224fcd4125c68d5f1b42ce68a5746f7c0b7fb50487f030c4772a4b198f09dfd763b9e", 0xa2, 0x1ff}]) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) unshare(0xa020000) 01:36:38 executing program 1: unshare(0x4040100) unshare(0x20000400) 01:36:38 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(0x0, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:38 executing program 5: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:38 executing program 1: unshare(0x6c020200) unshare(0x20000400) 01:36:39 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) [ 893.583285][T16598] loop4: detected capacity change from 0 to 16383 01:36:39 executing program 0: ptrace$setopts(0x4200, 0xffffffffffffffff, 0x4, 0x100000) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:39 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(0x0, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:39 executing program 5: unshare(0x2c020400) unshare(0x20000) unshare(0xa020000) 01:36:39 executing program 4: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 1: unshare(0x2c020400) set_mempolicy(0x4000, &(0x7f0000000000)=0xfffffffffffffffa, 0xfffff7fffffffff8) unshare(0x20000400) set_mempolicy(0x2, &(0x7f0000000040)=0x7fffffff, 0x401) 01:36:39 executing program 5: unshare(0x2c020400) unshare(0x20000) unshare(0xa020000) 01:36:39 executing program 4: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:39 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(0x0, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:39 executing program 1: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x8080) 01:36:39 executing program 0: unshare(0x3e050880) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e20, 0x6, @private0}, {0xa, 0x4e21, 0xfffffff7, @empty, 0x3}, 0x0, [0x0, 0x9, 0x6, 0x7fff, 0x6, 0x2904, 0x1, 0x76e]}, 0x5c) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) r4 = getgid() r5 = geteuid() r6 = getpid() msgctl$IPC_SET(r1, 0x1, &(0x7f0000000340)={{0x0, r3, r4, r5, 0xee00, 0x1, 0xffff}, 0x0, 0x0, 0x3, 0x7, 0x7, 0x9, 0x0, 0xffff, 0x1, 0xfffb, 0x0, r6}) prctl$PR_GET_SECUREBITS(0x1b) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000400)=ANY=[@ANYBLOB="46ffffff000000000a004e230001000100000000000000000000ffffe000000201ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000a004e2100004a1c2001000000000000000000000000000120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000a004e2100000401fe8000000000000000000000000000aa06000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2200000001ff01000000000000000000000000000108000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000001fe8000000000000000000000000000250900"/656], 0x290) prctl$PR_GET_SECUREBITS(0x1b) r7 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x280000) ioctl$SG_SET_COMMAND_Q(r7, 0x2271, &(0x7f0000000080)=0x1) openat$cgroup_type(r7, &(0x7f0000000040), 0x2, 0x0) 01:36:39 executing program 5: unshare(0x2c020400) unshare(0x20000) unshare(0xa020000) 01:36:39 executing program 4: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 1: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000000)="5fc7b363c1650975b44ca7c7297c8da6351409d36cf6c7f1380acc817370000ae3077e51bc11eaead4ecb87a711688b07c099f517a248e15940c7340940894dc6202c5e379daf99ec92edbc884fcfb0591bf2db0918b0a49", 0x58) unshare(0x2c020400) unshare(0x20000400) 01:36:39 executing program 0: unshare(0x2c020400) unshare(0x400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:39 executing program 4: unshare(0x2c020400) unshare(0x20000) unshare(0xa020000) 01:36:39 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:39 executing program 1: unshare(0x6c000300) unshare(0x10600) unshare(0x10400) unshare(0x24000800) 01:36:39 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:39 executing program 4: unshare(0x2c020400) unshare(0x20000) unshare(0xa020000) 01:36:39 executing program 5: syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 0: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) accept4(r5, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800) 01:36:39 executing program 1: r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) ptrace$getenv(0x4201, r0, 0x9, &(0x7f0000000340)) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000040)={0x3ff, {{0xa, 0x4e23, 0x0, @empty, 0x4}}, 0x1, 0x1, [{{0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xffffffff}}]}, 0x110) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000180)={@mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x4, 0x3, 0xbc6, 0x400, 0x7, 0x70001}) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x801}, 0x20040084) unshare(0x2c020400) unshare(0x20000400) 01:36:39 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, 0x0) 01:36:39 executing program 4: unshare(0x2c020400) unshare(0x20000) unshare(0xa020000) 01:36:39 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:39 executing program 5: syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 0: setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000000c0)={0x5d, 0x32, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x1}, @ra={0x5, 0x2, 0x1}, @pad1, @generic={0x83, 0x68, "f7fa1b507922106cb6742721d7f0a799af8ca55d037dee5f7f1d16f2cf337a535740523f4ae5806a1ade68f46aa6e5558a2c5bb11bbe4e149ba98122bb2da8bf462819c16f5a7841fcd6bb772fb1244f38e462f1f9f95e2d2c8ac1a4fd0a642ce0aafbd9b0900507"}, @ra={0x5, 0x2, 0x6}, @calipso={0x7, 0x30, {0x2, 0xa, 0x0, 0x2, [0x80000000, 0x8, 0x0, 0x6, 0xfa]}}, @hao={0xc9, 0x10, @private1}, @generic={0x3, 0xc5, "7a2e21fab5410545fc795c551be99861726c9be4c11f5149320e68a9f164342ca3fa38003bfedda8db4f688d10254b4eb28052abaa07811b8378d67eae4688492d83fc1bcb7bebc250e11ee299866971dd1a2d11c12d0e120a620c7b2f1cc8bd7178397d5336480237c53b60140aa804da641599e4e854e4898612936d4a4ab3a55cb74050dd01b0cbcde9c38ff678ff11820878ba3feb768e0ae13908718e613bc885c04bd6eb8bc299c544fb8d0183374137e36064e768a7ebdc9bc42ff1022facb7ede8"}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x1a0) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/160) 01:36:39 executing program 4: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 1: unshare(0x40000000) unshare(0x20000400) 01:36:39 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, 0x0) 01:36:39 executing program 4: syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 5: syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x1c3000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@initdev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@mcast1, r2}, 0x14) r3 = accept$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000480)=0x4, 0x4) 01:36:39 executing program 1: unshare(0x2c020400) inotify_rm_watch(0xffffffffffffffff, 0x0) unshare(0x20000400) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) unshare(0x1e000000) unshare(0x200) 01:36:39 executing program 4: syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 5: unshare(0x0) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:39 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, 0x0) 01:36:39 executing program 0: unshare(0x3a030700) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:39 executing program 5: unshare(0x0) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) [ 894.155310][ T25] audit: type=1326 audit(1623116199.510:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16744 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 01:36:39 executing program 4: syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 0: unshare(0x2c020400) unshare(0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = msgget$private(0x0, 0x4) msgctl$IPC_RMID(r0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) 01:36:39 executing program 5: unshare(0x0) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 4: unshare(0x0) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:39 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000180)=""/136) 01:36:40 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:40 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000380)) 01:36:40 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@remote, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) unshare(0x2c020400) unshare(0x20000400) 01:36:40 executing program 4: unshare(0x0) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:40 executing program 0: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/176) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f00000000c0)=""/189) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(0x0, 0x81, 0x88000) unshare(0xa020000) [ 894.975124][ T25] audit: type=1326 audit(1623116200.330:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=16744 comm="syz-executor.1" exe="/root/syz-executor.1" sig=9 arch=c000003e syscall=231 compat=0 ip=0x4665d9 code=0x0 01:36:40 executing program 1: unshare(0x2c020400) unshare(0x20000400) prctl$PR_CAPBSET_READ(0x17, 0x14) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(0x0, 0x81, 0x88000) unshare(0xa020000) 01:36:40 executing program 4: unshare(0x0) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:40 executing program 0: unshare(0x8040000) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) get_thread_area(&(0x7f0000000040)={0x5, 0x20000800, 0x4000, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1}) unshare(0x800) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0xc041) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(0x0, 0x81, 0x88000) unshare(0xa020000) 01:36:40 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = socket$inet6(0xa, 0x1, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private2}}, &(0x7f0000000180)=0xe8) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0xc00) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'ip6tnl0\x00', 0x0, 0x29, 0x80, 0x39, 0x4, 0x4, @private0, @empty, 0x700, 0x7, 0x80000000, 0x9}}) io_setup(0x6, &(0x7f0000000c80)=0x0) io_getevents(r4, 0x10000, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) io_pgetevents(r4, 0x66, 0x3, &(0x7f00000002c0)=[{}, {}, {}], &(0x7f0000000380)={r5, r6+60000000}, &(0x7f0000000400)={&(0x7f00000003c0)={[0xab]}, 0x8}) io_setup(0x6, &(0x7f0000000c80)=0x0) io_getevents(r7, 0x10000, 0x0, 0x0, 0x0) io_getevents(r7, 0x2, 0x8, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x0) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000140)={@local, r3}, 0x14) r8 = syz_open_dev$rtc(&(0x7f0000000000), 0x5991, 0x311040) ioctl$RTC_UIE_OFF(r8, 0x7004) r9 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4e22, 0x0, 0x4e20, 0x9, 0xa, 0x20, 0x80, 0x11, 0x0, r1}, {0x80000001, 0xfffffffffffffff8, 0x3, 0x3, 0x5, 0x8, 0x8, 0x1f}, {0x0, 0x8, 0x4, 0x800}, 0xfffff387, 0x6e6bb3, 0x1, 0x1, 0x0, 0x3}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d6, 0x33}, 0x2, @in6=@loopback, 0x3500, 0x2, 0x3, 0x1f, 0x5, 0x20, 0x3}}, 0xe8) 01:36:40 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, 0x0) 01:36:40 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000380)) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(0x0, 0x81, 0x88000) unshare(0xa020000) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(0x0, 0x81, 0x88000) unshare(0xa020000) 01:36:40 executing program 0: sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x8c, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x7}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xf}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x800, 0x70bd2a, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000041}, 0x4c000) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000340)) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x88000) unshare(0xa020000) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(0x0, 0x81, 0x88000) unshare(0xa020000) 01:36:40 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) unshare(0x4000000) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0xa020000) 01:36:40 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, 0x0) 01:36:40 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000380)) 01:36:40 executing program 1: unshare(0x2c020400) unshare(0x20000400) unshare(0x20280) 01:36:40 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/77) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x88000) unshare(0xa020000) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0x0) 01:36:40 executing program 0: unshare(0x2c020400) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/166) 01:36:40 executing program 1: unshare(0x2c020400) unshare(0x32040600) 01:36:40 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, 0x0) 01:36:40 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[0x0]) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0xa020000) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0x0) 01:36:40 executing program 0: unshare(0x20000d80) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgget$private(0x0, 0x2) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/50) msgctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f0000000280)=""/152) r0 = msgget(0x1, 0x20) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000180)=""/208) 01:36:40 executing program 1: unshare(0x2c020400) unshare(0x20000400) unshare(0x4000000) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0x0) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0x0) 01:36:40 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0189436, 0x400000) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0x0) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0x0) 01:36:40 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[0x0]) 01:36:40 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000380)) 01:36:40 executing program 1: unshare(0x2c020400) prctl$PR_SET_KEEPCAPS(0x8, 0x1) r0 = getpgid(0xffffffffffffffff) getpgrp(r0) unshare(0x20000400) prctl$PR_SVE_GET_VL(0x33, 0xf3b9) msgget$private(0x0, 0x8) unshare(0x44000000) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0x0) 01:36:40 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) unshare(0x0) 01:36:40 executing program 0: unshare(0x2c020400) socket$inet6(0xa, 0x1, 0x3) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:40 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) unshare(0x4000000) 01:36:40 executing program 4: unshare(0x2c020400) syz_open_dev$sg(0x0, 0x81, 0x88000) unshare(0xa020000) 01:36:40 executing program 1: unshare(0x4000880) inotify_init() r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x4000001) unshare(0x20000400) inotify_init() 01:36:40 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000380)) 01:36:41 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[0x0]) 01:36:41 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) unshare(0x4000000) 01:36:41 executing program 0: r0 = socket(0x18, 0xa, 0x2) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000)={0x16, 0x1, '\x00', [@generic={0x7, 0x2, "2892"}, @pad1, @jumbo={0xc2, 0x4, 0x4}]}, 0x18) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 4: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:41 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) unshare(0x4000000) 01:36:41 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x0, &(0x7f0000000380)) 01:36:41 executing program 1: setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000000)=ANY=[], 0x590) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000240)=0x1c) pipe2(&(0x7f0000000580)={0xffffffffffffffff}, 0x4000) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000005c0)={@remote, 0x27}) unshare(0x2c010480) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r2}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8606000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0xe05b204b919f110e) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0x2b}, 0x36, r2}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000280)="b5c3ec5c967c9db230c920714bc18693cfd0ac99757378d4a7364c0ed00b8a63deb0c8bde34d549e93eb90ae89011cc1390ef4aad0657b12bc5a2d2a1f3da712581a8febb754e2e94ec76ce1aa28f54f64b0cefe8d3dba810ccf40892a7ee8e5971abccfeca3c2aab0fd203646ec5836baede6088ca9ed2c0b09ff13bdc046e3d3387271e38f9e9d9b4d44a0cc80a74d136523fe2f5c25f24728bc8122293acf7716e485c9355cd5e987668ab8d02dc67d85f499c7efbcf7e5d6ae6eb88a7ed1ae5dd00d716c313f6634e3d4c81ac2", 0xcf, 0x4814, &(0x7f0000000100)={0xa, 0x4e22, 0x3, @loopback, 0x100001}, 0x1c) unshare(0x20000400) sendto$inet6(0xffffffffffffffff, &(0x7f0000000140)="521fa047c7831ac95634a6a70d89ed007ea03414befc4f6eddab6bf95b6dab348a8ad783cae873f0d75f4d234d94cfa68844bb8266cbe046c236cc2073e9dd56b14c48bcb701430fb76136564cfa0861ea658a6b39600132a33e5843916a9cb95398818c3c322ec1b10dcf1cff09d5a53918131ecb", 0x75, 0x20040820, &(0x7f00000001c0)={0xa, 0x4e23, 0x4, @ipv4={'\x00', '\xff\xff', @local}, 0x2}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000004c0)={'raw\x00', 0x0, [0x9, 0xff, 0x0, 0x869, 0x6]}, &(0x7f0000000540)=0x54) r3 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) getsockopt$inet6_tcp_int(r3, 0x6, 0x4, &(0x7f00000000c0), &(0x7f0000000380)=0x4) 01:36:41 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:41 executing program 0: unshare(0x2c020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x3a, &(0x7f0000000000), 0x8) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0xc000000) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), r0) 01:36:41 executing program 5: unshare(0x2c020400) unshare(0x4000000) 01:36:41 executing program 4: unshare(0x2c020400) unshare(0x20000) unshare(0xa020000) 01:36:41 executing program 5: unshare(0x4000000) 01:36:41 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) sched_setaffinity(0xffffffffffffffff, 0x8, &(0x7f0000000040)=0x4) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[0x0]) 01:36:41 executing program 5: unshare(0x4000000) 01:36:41 executing program 1: setresgid(0xee00, 0xee01, 0xffffffffffffffff) unshare(0x2c020400) ptrace$setopts(0x4206, 0xffffffffffffffff, 0x400, 0x100068) unshare(0x20000400) 01:36:41 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:41 executing program 4: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:41 executing program 0: unshare(0x2c020400) 01:36:41 executing program 5: unshare(0x4000000) 01:36:41 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[0x0]) 01:36:41 executing program 1: unshare(0x2c020400) unshare(0x20000400) socket$inet6_tcp(0xa, 0x1, 0x0) 01:36:41 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:41 executing program 5: unshare(0x0) unshare(0x4000000) 01:36:41 executing program 0: unshare(0x2c020400) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfffffffa}, {0xa, 0x4e24, 0x7, @private0, 0xd9}, 0x4, [0x40, 0xbded, 0x2, 0xd0, 0x8cf, 0xfc4, 0x5]}, 0x5c) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 1: unshare(0x2c020400) unshare(0x20000400) unshare(0x4060000) unshare(0x4020000) 01:36:41 executing program 0: unshare(0x64000000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 5: unshare(0x0) unshare(0x4000000) 01:36:41 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[0x0]) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) accept4(r5, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800) 01:36:41 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:41 executing program 1: getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@loopback}, &(0x7f0000000040)=0x14) unshare(0x2c020400) unshare(0x20000400) 01:36:41 executing program 5: unshare(0x0) unshare(0x4000000) 01:36:41 executing program 0: unshare(0x20060400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) accept4(r5, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800) 01:36:41 executing program 1: unshare(0x2c020400) socket$inet6(0xa, 0x80000, 0x4) unshare(0x20000400) 01:36:41 executing program 5: unshare(0x2c020400) unshare(0x0) 01:36:41 executing program 0: unshare(0x2c020400) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000200)={{0xa, 0x4e24, 0x3, @ipv4={'\x00', '\xff\xff', @local}, 0x9}, {0xa, 0x4e22, 0x131, @loopback, 0x7}, 0x0, [0x0, 0x101, 0x10001, 0x9, 0x0, 0x10001, 0x69c, 0x80000000]}, 0x5c) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000280)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgsnd(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000000000039a58fa2d5777a51570df192b24d454136555f104dee1debd033309dec820d46c6b304b741980d9acf0a5b50233f1e428d79eb3aa747aa773cdccd74d2aa646b88c074bd461b53f8d31a2e097b70c528066099fa17c3d89e22b082b785f160b22a1a01000100000000008e5b0613579932"], 0x6b, 0x800) 01:36:41 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) accept4(r5, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800) 01:36:41 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1, r0}]) 01:36:41 executing program 5: unshare(0x2c020400) unshare(0x0) 01:36:41 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) unshare(0x3c070700) unshare(0x100) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, 0x0, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) unshare(0x40400) unshare(0x50020480) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, &(0x7f0000000040)=0x1) 01:36:41 executing program 0: unshare(0x2c020400) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="020025bd7000fddbdf2503000000280001a008000600070024d108000600050000001400040000000000000000000000fffff32559681d82665b08000600000000836115296f79949514e80f000500020003000000060001000a00000008000300ac141416080003005f00000108000300ffffffff0800030007000000"], 0x78}}, 0x4014) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) 01:36:41 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:41 executing program 5: unshare(0x2c020400) unshare(0x0) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) 01:36:41 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, r0}]) 01:36:41 executing program 0: setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e22, 0x401, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, {0xa, 0x4e20, 0x3, @empty, 0x4}, 0x1ff, [0x6, 0x9, 0xf3, 0x8, 0x8, 0x3, 0x0, 0x3]}, 0x5c) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 1: unshare(0x2c020400) unshare(0x38000300) unshare(0x24000200) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) 01:36:41 executing program 5: unshare(0x2c020400) unshare(0x20000400) unshare(0x4060000) unshare(0x4020000) 01:36:41 executing program 1: unshare(0xa010400) unshare(0x78020000) setgid(0x0) r0 = gettid() getpgrp(0x0) ptrace$pokeuser(0x6, r0, 0x0, 0x0) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x10000, 0x7) unshare(0x8000300) getpid() prlimit64(r0, 0xd, 0x0, &(0x7f0000000000)) getpgid(r0) 01:36:41 executing program 0: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop3', 0x4000, 0x2e) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:41 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, r0}]) 01:36:41 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) 01:36:41 executing program 5: unshare(0x2c020400) unshare(0x20000400) unshare(0x4060000) unshare(0x4020000) 01:36:41 executing program 1: unshare(0x2c020400) unshare(0x20000400) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x101, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40001}, 0x0) 01:36:41 executing program 0: unshare(0xc020480) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/174}, 0xb6, 0x1, 0x2000) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x200000, 0x0) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) 01:36:41 executing program 5: unshare(0x2c020400) unshare(0x20000400) unshare(0x4060000) unshare(0x4020000) 01:36:41 executing program 2: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0, r0}]) 01:36:41 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1}]) 01:36:41 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) 01:36:41 executing program 0: ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x8, 0x82040) ioctl$RTC_UIE_ON(r0, 0x7003) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x6, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000000)) 01:36:41 executing program 5: unshare(0x2c020400) unshare(0x20000400) unshare(0x4060000) 01:36:41 executing program 1: unshare(0x2c020400) unshare(0x60000400) 01:36:42 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) 01:36:42 executing program 0: unshare(0x2c020400) wait4(0xffffffffffffffff, &(0x7f0000000040), 0x20000000, &(0x7f0000000180)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 5: unshare(0x2c020400) unshare(0x4060000) 01:36:42 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}]) 01:36:42 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:42 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}]) 01:36:42 executing program 5: unshare(0x4060000) 01:36:42 executing program 1: unshare(0x2c020400) socket(0x2, 0x80000, 0x1) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="b6ddef060136e900e2d98c86651a3009a49bca231977304374f8073a6d98be37c502c13f258b1229d835a2a32a781d4905aa81cb9177609c5bc379f63a5c4902d6755cd2cbfbf2b56a10c820126ea04862ff9bc10d788d6cb36e03b257b18e707c817bc1a07c71c6621ce3ef7ae5abb100d641037336412e712e908802f3e3c95749b5b2218f859d77756f14d8434eb37e0dd9bce6a3460229d4b3e8", 0x9c, 0x20000800, &(0x7f0000000040)={0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x81}, 0x1c) unshare(0x24000c00) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa4, r2, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbf3b}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x52}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x1c}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0xe}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x50}) unshare(0x8000080) 01:36:42 executing program 0: unshare(0x3e020480) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) unshare(0x40000000) unshare(0x80) 01:36:42 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:42 executing program 5: unshare(0x4060000) 01:36:42 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 01:36:42 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:42 executing program 5: unshare(0x4060000) 01:36:42 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}]) 01:36:42 executing program 0: unshare(0x2c020400) io_destroy(0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 1: unshare(0x120c0e00) unshare(0x20000400) 01:36:42 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) msgget(0x2, 0x1) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 01:36:42 executing program 5: unshare(0x0) unshare(0x4060000) 01:36:42 executing program 0: ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000180)) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f0000000000)=""/145) 01:36:42 executing program 1: unshare(0x2c020400) unshare(0x20000400) inotify_init1(0x1000) 01:36:42 executing program 2: unshare(0x2c020400) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x1}]) 01:36:42 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 01:36:42 executing program 4: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 01:36:42 executing program 5: unshare(0x0) unshare(0x4060000) 01:36:42 executing program 0: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000000), 0x1ff, 0x800) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/158) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000200)=""/241) msgctl$MSG_STAT(0xffffffffffffffff, 0xb, &(0x7f0000000180)=""/91) 01:36:42 executing program 1: unshare(0x2c020400) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x84}, 0x81) unshare(0x20000400) 01:36:42 executing program 4: unshare(0x2c020400) socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 5: unshare(0x0) unshare(0x4060000) 01:36:42 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/166) unshare(0x20000500) unshare(0x20000) 01:36:42 executing program 4: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 3: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 01:36:42 executing program 2: unshare(0x2c020400) io_setup(0x1, &(0x7f0000000000)=0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 01:36:42 executing program 1: unshare(0x58020b00) unshare(0x22000600) unshare(0x2010900) 01:36:42 executing program 5: unshare(0x2c020400) unshare(0x0) 01:36:42 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 0: unshare(0x2c020400) unshare(0x28000000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 5: unshare(0x2c020400) unshare(0x0) 01:36:42 executing program 1: unshare(0x180) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000000)=ANY=[], 0x10) unshare(0x1f5d72eeeb62f926) 01:36:42 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 2: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/166) unshare(0x20000500) unshare(0x20000) 01:36:42 executing program 3: unshare(0x3e020480) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) unshare(0x40000000) unshare(0x80) 01:36:42 executing program 0: unshare(0x2c020400) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgget$private(0x0, 0x40) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/153) 01:36:42 executing program 5: unshare(0x2c020400) unshare(0x0) 01:36:42 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 1: unshare(0xe000300) unshare(0x20000400) 01:36:42 executing program 2: unshare(0x2c020400) unshare(0x28000000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 3: unshare(0x3e020480) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) unshare(0x40000000) unshare(0x80) 01:36:42 executing program 4: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 1: unshare(0x2c020400) unshare(0x2c000400) keyctl$set_reqkey_keyring(0xe, 0x6) 01:36:42 executing program 5: unshare(0x2c020400) wait4(0xffffffffffffffff, &(0x7f0000000040), 0x20000000, &(0x7f0000000180)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x4e24, 0x39, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x3}, {0xa, 0x4e24, 0x9, @private0, 0x7f}, 0x400, [0xd847, 0x0, 0x2, 0x7, 0x0, 0x86, 0x8001, 0x8]}, 0x5c) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r1, &(0x7f0000000540)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, 0x0, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000015}, 0x4000000) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x8, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@noextend}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@noextend}, {@debug={'debug', 0x3d, 0xffffffffffff8000}}, {@mmap}, {@fscache}, {@aname={'aname', 0x3d, '])&-%'}}], [{@dont_measure}, {@uid_gt}]}}) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000300)={0x7, 0xa1, "29182840e80e1881adafbb640e1f6caf787b73375eecd3e2812e726cc61a8c98867582046c85e94706a6a349cf2939f3c3d56d549746ae2627624e8076ad82d72c379bcad3e11a6259bda2f9423152bce650e6bdee5e694e12a3638f44766b819e1a42223493ad68ceec4fd72c57fa8be9159613249cc09af638d30f1f935eca83533f5efc5e0f87d1cf8dcc35a4bf9442d3bd87a3faa85a8671e5a25bd8065054"}) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/187}, 0xc3, 0x1, 0x0) unshare(0x14000c00) 01:36:42 executing program 4: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 2: unshare(0x2c020400) unshare(0x28000000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 5: unshare(0x2c020400) wait4(0xffffffffffffffff, &(0x7f0000000040), 0x20000000, &(0x7f0000000180)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 3: unshare(0x2c020400) unshare(0x38000300) unshare(0x24000200) 01:36:42 executing program 1: unshare(0x2c020400) unshare(0x20000400) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r0}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'sit0\x00', r0, 0x0, 0x7, 0x5, 0xffffffff, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8, 0x80, 0xfff, 0x8}}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000000)={0x5, {{0xa, 0x4e23, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xfffffc00}}}, 0x88) 01:36:42 executing program 0: unshare(0x6c050600) unshare(0x80) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/acpi', 0x101000, 0x120) unshare(0x40000000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 2: unshare(0x2c020400) unshare(0x28000000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 4: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 5: unshare(0x2c020400) wait4(0xffffffffffffffff, &(0x7f0000000040), 0x20000000, &(0x7f0000000180)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 1: unshare(0x2c020400) unshare(0x20000400) unshare(0x12030780) 01:36:42 executing program 3: unshare(0x2c020400) unshare(0x38000300) unshare(0x24000200) 01:36:42 executing program 2: unshare(0x2c020400) unshare(0x28000000) 01:36:42 executing program 4: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:42 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)={0xff, 0xad, "a788e3a1a369019be95e5efedcf0ccc3a0f0645909f4f7e4f564fa59acd9c987cdb17845a1d94a08997041ab73ea6ed3e0b8ffd5977536113c20eba7559310fb935140bdc8f48c2cb3770b6168917894c1351148850e4c9997626349f4f8777915b9cc9a918fe664241e3f3aabb700a49086cf2089790958d7728418500fd655267c74aaf77c08119f229dccc50522a025955c804f06b4212bbeeb848f7fa36a032dc8ee0b34685fc7ff8900fc"}) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:42 executing program 5: unshare(0x2c020400) wait4(0xffffffffffffffff, &(0x7f0000000040), 0x20000000, &(0x7f0000000180)) 01:36:42 executing program 1: unshare(0x5a020400) unshare(0x20000400) 01:36:42 executing program 3: unshare(0x2c020400) unshare(0x38000300) unshare(0x24000200) 01:36:43 executing program 2: unshare(0x28000000) 01:36:43 executing program 0: unshare(0x2c020400) socket$inet6_udp(0xa, 0x2, 0x0) msgctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000000c0)=""/178) 01:36:43 executing program 4: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:43 executing program 5: wait4(0xffffffffffffffff, &(0x7f0000000040), 0x20000000, &(0x7f0000000180)) 01:36:43 executing program 1: unshare(0x2c020400) unshare(0x20000400) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000000)) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x12, 0x2d, 0x9, 0x2, 0x3, 0x200, 0x3, 0x40, 0xffffffffffffffff}}) 01:36:43 executing program 3: unshare(0x2c020400) unshare(0x24000200) 01:36:43 executing program 4: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2a680, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:43 executing program 2: unshare(0x28000000) 01:36:43 executing program 0: unshare(0x2c020400) unshare(0x40000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/169) unshare(0x50060c00) 01:36:43 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/250) socket$inet6(0xa, 0x4, 0x5c6) 01:36:43 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x20000000, &(0x7f0000000180)) 01:36:43 executing program 3: unshare(0x24000200) 01:36:43 executing program 0: unshare(0x50000400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000180)=""/136) set_tid_address(&(0x7f0000000000)) 01:36:43 executing program 4: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:43 executing program 2: unshare(0x28000000) 01:36:43 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) 01:36:43 executing program 3: unshare(0x24000200) 01:36:43 executing program 1: unshare(0x0) unshare(0x20000400) 01:36:43 executing program 0: unshare(0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) io_setup(0x6, &(0x7f0000000c80)=0x0) io_getevents(r0, 0x10000, 0x0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000c80)=0x0) io_getevents(r1, 0x10000, 0x0, 0x0, 0x0) io_destroy(r1) 01:36:43 executing program 2: unshare(0x0) unshare(0x28000000) 01:36:43 executing program 3: unshare(0x24000200) 01:36:43 executing program 4: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:43 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) 01:36:43 executing program 1: unshare(0xe030480) unshare(0x0) 01:36:43 executing program 4: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:43 executing program 2: unshare(0x0) unshare(0x28000000) 01:36:43 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f00000000c0)=""/166) 01:36:43 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) 01:36:43 executing program 3: unshare(0x0) unshare(0x24000200) 01:36:43 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x80000001, 0x800) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xba}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x80) unshare(0x2c020400) unshare(0x20000400) 01:36:43 executing program 4: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:43 executing program 2: unshare(0x0) unshare(0x28000000) 01:36:43 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x20000000, 0x0) 01:36:43 executing program 0: unshare(0x2c020400) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000080)=@fragment={0x33, 0x0, 0x2, 0x0, 0x0, 0x1, 0x65}, 0x8) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgctl$MSG_STAT(0xffffffffffffffff, 0xb, &(0x7f0000000000)=""/100) 01:36:43 executing program 3: unshare(0x0) unshare(0x24000200) 01:36:43 executing program 2: unshare(0x2c020400) unshare(0x0) 01:36:43 executing program 1: unshare(0x2c020400) unshare(0x0) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_open_dev$vcsa(&(0x7f00000001c0), 0xd257, 0x80000) syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r2) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x20, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x44000}, 0x4040051) unshare(0x20000400) 01:36:43 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x4000000) getsockopt$inet6_buf(r0, 0x29, 0x44, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgget(0x2, 0x180) 01:36:43 executing program 4: unshare(0x2c020400) unshare(0x2c000400) keyctl$set_reqkey_keyring(0xe, 0x6) 01:36:43 executing program 3: unshare(0x0) unshare(0x24000200) 01:36:43 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) accept4(r5, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800) 01:36:43 executing program 2: unshare(0x2c020400) unshare(0x0) 01:36:43 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/149) 01:36:43 executing program 4: unshare(0x2c020400) unshare(0x2c000400) keyctl$set_reqkey_keyring(0xe, 0x6) 01:36:43 executing program 2: unshare(0x2c020400) unshare(0x0) 01:36:43 executing program 3: unshare(0x2c020400) unshare(0x0) 01:36:43 executing program 1: unshare(0x6010200) prctl$PR_GET_SECUREBITS(0x1b) unshare(0x8000300) r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000080}, 0x40000) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), 0xffffffffffffffff) prctl$PR_GET_SECUREBITS(0x1b) 01:36:43 executing program 4: unshare(0x2c020400) unshare(0x2c000400) keyctl$set_reqkey_keyring(0xe, 0x6) 01:36:43 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) accept4(r5, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800) 01:36:43 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x8080) 01:36:43 executing program 3: unshare(0x2c020400) unshare(0x0) 01:36:43 executing program 1: setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000000000)={0x6, {{0xa, 0x4e23, 0x8a16, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1}}, {{0xa, 0x4e23, 0x1, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x5a91}}}, 0x108) unshare(0x2c020400) unshare(0x20000400) 01:36:43 executing program 0: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) accept4(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x80, 0x80800) msgctl$MSG_INFO(0xffffffffffffffff, 0xc, &(0x7f0000000340)=""/254) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/module/netpoll', 0xb2bc0, 0x103) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x38, r2, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000810}, 0x20004004) 01:36:43 executing program 4: unshare(0x2c020400) unshare(0x2c000400) 01:36:43 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) accept4(r5, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800) 01:36:43 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x8080) 01:36:43 executing program 3: unshare(0x2c020400) unshare(0x0) 01:36:43 executing program 1: unshare(0x40000) prctl$PR_GET_SECUREBITS(0x1b) unshare(0x62078a00) 01:36:43 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) r5 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) 01:36:43 executing program 0: unshare(0x2d000580) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:43 executing program 4: unshare(0x2c000400) 01:36:43 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x8080) 01:36:43 executing program 1: unshare(0x2c020400) unshare(0x20020500) 01:36:43 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x44680) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x3, 0x5, 0x40, @mcast1, @mcast2, 0x7800, 0x700, 0x2, 0xba28}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0xb, r0}) 01:36:43 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x8080) 01:36:43 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x0) 01:36:43 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x8080) 01:36:43 executing program 4: unshare(0x2c000400) 01:36:43 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) 01:36:43 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) ioctl$RTC_EPOCH_READ(r4, 0x8008700d, &(0x7f0000000280)) 01:36:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000040)={@remote, 0x0}, &(0x7f0000000080)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000000)={@empty, r1}, 0x14) unshare(0x6020100) getsockname$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x1c) unshare(0xe000f00) 01:36:43 executing program 0: unshare(0x40000000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:43 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x24, 0x0, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20040000}, 0x8080) 01:36:43 executing program 4: unshare(0x2c000400) 01:36:43 executing program 1: unshare(0x2c020c00) unshare(0x20000400) unshare(0x0) keyctl$set_reqkey_keyring(0xe, 0x7) 01:36:43 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) 01:36:43 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x204440, 0x0) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) getsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000300)=""/76, &(0x7f0000000100)=0x4c) 01:36:44 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_RMID(r0, 0x0) 01:36:44 executing program 4: unshare(0x0) unshare(0x2c000400) 01:36:44 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) r6 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) sendmsg$IPVS_CMD_ZERO(r6, 0x0, 0x0) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 4: unshare(0x0) unshare(0x2c000400) 01:36:44 executing program 0: unshare(0x2c020400) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x3f, 0x2, 0x3, 0x0, 0x3ff, 0x1f}, 0x20) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:44 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r0}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x5, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000140)={@loopback, r0}, 0x14) unshare(0x2c020400) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in=@empty, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) unshare(0x20000400) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r2}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'syztnl0\x00', r2, 0x2f, 0x1, 0x7, 0x4, 0x20, @private2, @mcast2, 0x8, 0x80, 0x5, 0x2}}) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) unshare(0x480) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 4: unshare(0x0) unshare(0x2c000400) 01:36:44 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) msgget$private(0x0, 0x408) 01:36:44 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r4}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) 01:36:44 executing program 1: unshare(0x2c020400) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) unshare(0x20000400) 01:36:44 executing program 4: unshare(0x2c020400) unshare(0x0) 01:36:44 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/174) msgctl$IPC_RMID(0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x410) msgctl$MSG_STAT_ANY(r0, 0xd, &(0x7f00000000c0)) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 1: unshare(0x0) unshare(0x467729ffcbc89111) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40012}, 0x0) r3 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000028bd7000089f0f75db2c25d830e12669ffdbdf25030000000800010001000000080001000000000008000200020022000000080001000200000008000200020000000800"], 0x4c}, 0x1, 0x0, 0x0, 0x4008000}, 0x40800) 01:36:44 executing program 4: unshare(0x2c020400) unshare(0x0) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r4}, 0x14) unshare(0x2c020400) unshare(0x480) unshare(0x20000400) 01:36:44 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) 01:36:44 executing program 0: unshare(0x2c020400) unshare(0x10000200) getitimer(0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = msgget$private(0x0, 0x100) msgctl$IPC_RMID(r0, 0x0) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 4: unshare(0x2c020400) unshare(0x0) 01:36:44 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r4}, 0x14) unshare(0x2c020400) unshare(0x480) 01:36:44 executing program 1: unshare(0x2c020400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000000)=0x4) unshare(0x12000000) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) msgget(0x2, 0x1) 01:36:44 executing program 0: unshare(0x2a0604c0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/168) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r4}, 0x14) unshare(0x480) 01:36:44 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 0: r0 = inotify_init1(0x80800) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$inet6(r3, &(0x7f0000000fc0)={&(0x7f0000000900)={0xa, 0x4e22, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}, 0x9}, 0x1c, &(0x7f0000000e40)=[{&(0x7f0000000940)="d5eba8c9b4bedcd032c231c49f8eaf3b71deb096e526d58c6c47575531379e2ed226fefa6c484aebd1191d98f579a6241966d5a108d42a2d5998e5fb41f7f3da3dfefee5", 0x44}, {&(0x7f00000009c0)="dd8fce7051dd222992e388c9a6a2c187d60fe13f79c90590501f909ff7106f8800f2c792995f9e2531c05c288026baf695146b8ee7a796c939c99e475c2edc071c73366c3923ff901fe058390061a89ac5562015f2316ff455e0c402444627", 0x5f}, {&(0x7f0000000a40)="c2540b2df77d037ea240dc6c9f4e5c0461f0ffeeb5ffb6519edfdafd108d0d828272be7d2143dee69afce69e65625b69eddc97e6ccd49f4159e24e74429208088675d0b524ee6d096fe91ca064e41d12ae9daad8cf9300818fd8abdff67e2ca8be696cbe58d66a8cb93df5ad8bd748525714afc9a78663ce8e0bb48ed768bb8cea5189819dd5bd2ab6efbb433db38c4495e2a4a62657b4c8bc8f41136640af3e15728c784bfc36e2d269a4313481c1867e367cc837572e265dc614aff10b1cc270233def778e54af82ce7f902a665a20c870f1a4be197cc66d573ddd96b5716dca4fabf9425103796558b749c5eb058f", 0xf0}, {&(0x7f0000000b40)="a9510e00385edeca471746fdf99dd518bf03326e34218533f80236f33af12cd3cbfab6fe3c7e92e6ed6d4922ff994359c374037d1ada35e227f11969821e001d9def4f5d2c78f4aec59617b0211c1e8320a698bd91e3370758586787af55176f543bf12bc728a34974f502ba6429c4474bd06d9da93092385b6e08f9e05fcbf731fbc8b214a619f97ad2d352ec4dbbdbeed14d6d1af543e98e80f23f19364b1cedebec91d7aaf82481b21ea4d5245df5d62c6ee57b87beb4b9d1d0dbc86438a337a590d1218b9b1d630d04b383b742d50a7873c90dd7f4ab3a847d776319c555758da6607bae7c3bc7da", 0xea}, {&(0x7f0000000c40)="3d60656b4be332e29b0f601108c40f0a53c591a2ed1d8e02774b8c26a8a27ad400ba4c0dd3e3f2880105818bceed55df39179f1d4f5351fed41896a2800228bbcd8b8c72f02c775a65ffb8a1e4025d8d8e81eaef8daecd1c613763bf2e0e8c9fee57231d2e0e2fb565785556605c6ed0360f4f", 0x73}, {&(0x7f0000000cc0)="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", 0xfc}, {&(0x7f0000000dc0)="2e478e9430c06d9d5d550ba64fce532583319a07c71f8065d2a24a75d72c3f1dd07bee60eef27d32e651a05e", 0x2c}, {&(0x7f0000000e00)="00c9a199716c31826251fea97b71ba3868d2052841bf524e768c4e595d4c054940800272fe049c10", 0x28}], 0x8, &(0x7f0000000ec0)=[@tclass={{0x14, 0x29, 0x43, 0x3}}, @rthdr={{0x28, 0x29, 0x39, {0x3b, 0x2, 0x1, 0xa, 0x0, [@remote]}}}, @dstopts={{0x50, 0x29, 0x37, {0x2c, 0x6, '\x00', [@hao={0xc9, 0x10, @empty}, @pad1, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x0, 0x4, 0x9, 0xee1b, [0xfffffffffffffff8, 0x2]}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x1000}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}], 0xe8}, 0x44802) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) io_submit(0x0, 0x8, &(0x7f00000008c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x6085, 0xffffffffffffffff, &(0x7f0000000000)="7e00ff5efad184454cf62b99692a22ce698efda94dd80aed797cba6e2484a0c75ad7959a023a70550ea264c00ac431499c93bdc23e54f84f2702d9ed42e6e1b0914fa193d07b97cc00a44f00f94cce2878c4142b3b197d311ab609e65e364877cfc36b431987b4f3a43c8188801277c070d914cef7b95ea705edfc0cf5174ceb878aeeb2d1a1a283d04f8d339e69d94361531984f07142", 0x97, 0x100000001, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x1906, 0xffffffffffffffff, &(0x7f00000001c0)="f70834444dd099359ee9ade805625728f1d79e5ee4cd2edd523f9940aee3bf4a3578c460576ad2e0e142518d6932ef45ccba29c1920c328c469adf9b0e490dd8b64b00e0afc1df5b0c0ca190a8d37067ba3d8e45b8e5c9d562e7e3233be8a5d2b559f4d2f18a4117bb4be43d79b86411cf38f9c803f09faa837f54ff3ad534f56c6ab889127f02", 0x87, 0x4}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x8, 0xffffffffffffffff, &(0x7f00000002c0)="b4c4023406b5417c8f6894d576694fca8b8a6191ae4e2133271e8eb5c879cd64899fe096eefdccb4fbbb1d66ecebd7fbc0a15fca768158a6c52a211a278b771c156564e0cd8548446696eaa7554fc0d9dd78d7306edbbd414e88c5aa6b7335feac05c1a8d95d0e6c61e546d28e4dec349ee051baca5682777fae7d9a846ed870bed3c502a08b66e974743f0d3d4e611fb56ff2debd90", 0x96, 0x6, 0x0, 0x1}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x7, 0x8001, r0, &(0x7f00000003c0)="694b7ef988d60571fa8f2531470a2db8fe27e38fb15cebcd21fa07aaa309b3c21b4698a8330ad2ddcc285a25b8f5bee07a68b19de9aa880356b1c9081de59dd2f901692eed01342d5e4e6ceecb5ae83f41a5e05158bff745093acbb76b6ec3b850317a1cda02247fcab8ff27c2ddb5c1c69b8c0263f5c229164ae61572264d4b2120738f65cb0d8f080c996a67a2a3a89eeedd863e79aec53fa7ec6c83e6b44a660dc56403c5e3407c60c41ed752dd09dc0f410d59db2dcace50d9423abe996ad39ad4578fe7b2e5ddcda8e67bd400be67fe817c8b47032b913be9fd72", 0xdd, 0xd6, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x11, r1, &(0x7f0000000500)="ca969ca7d835d61c650908ce5ad36148226c7c6edba76375c9838a1be567cf4e41acbd3f22c9bfd735c9cf577ddb7ab6dec3a68dcd56bdb623af5c3b2206d8c9ec03ba", 0x43, 0x80b, 0x0, 0x2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x80, r2, &(0x7f00000005c0)="6d85ac8f4aba2c77453c2154b2b99b6ed19cfcda0a524a53dfe78f9d9cd80da2d49d1f580585889cccad611652930d65a95f9af8e9f1559eb27d7402c915156419d5f554a81a0f4f3ebf3b14b4edc04bd3b57f022d0618e504ea07847b11a641c827232dfc3110f452bbb20f896c640c75a19504e3828d535d66daf620f3ae5d8e3125e56fb5af70bc1a7f", 0x8b, 0x7, 0x0, 0x0, r3}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x7, 0xfff, r4, &(0x7f00000006c0)="362172389c820594989b722b27bf64b816ecae1726545a8a04bbb3ce9c5f2f1eaf31bd53cb10bc6179390110ecdcd1066d3e234f469a272b3e47e4524ce3d7196c8225517e0508f8b4921d2d03f8f241e6ff7e0a312b6c9e1efce4c8bd49d06b4159c3c8870e30de0da3a2286c715d6c8410bbdaa67d0a054208946aa64b011261a9ee670b7759350494793e4a084e4a94eb6141fd75ae89c45f633ddf9819f6d21fd6a85f0b5e7a5794acfb155d6ffa7bd8b6e41c119bbb393f9cba6fec970efe73f6387e702d0f6f197e869046b59e623446b503ccd1c279df41c130", 0xdd, 0x7fff, 0x0, 0x1}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffffffffffffff, &(0x7f0000000800)="f308db759b7eabdf712e1a4d9259b2dff7b24dc5b330a788bfcbe9f2a1de240ae425f4a74d91fa8386cc3d591e346058549dd5461615a9a1f79d0aa9af035faf8f117bb4b60c8ec43d70dbaa19", 0x4d, 0x7, 0x0, 0x2}]) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r4}, 0x14) unshare(0x480) 01:36:44 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x90040) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r0) keyctl$session_to_parent(0x12) 01:36:44 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:44 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r4}, 0x14) unshare(0x480) 01:36:44 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x7fffffff) 01:36:44 executing program 5: unshare(0x2c020400) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:44 executing program 1: unshare(0x2c020400) unshare(0x46050700) unshare(0x4000000) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)=0x7ff) getpid() set_mempolicy(0x1, &(0x7f0000000040)=0x1, 0x7) 01:36:44 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) unshare(0x2c020400) unshare(0x480) 01:36:44 executing program 5: unshare(0x2c020400) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) unshare(0x2c020400) unshare(0x480) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/176) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in=@empty, 0x4e20, 0xfff8, 0x4e23, 0x0, 0xa, 0x0, 0x80, 0x3b, 0x0, 0xffffffffffffffff}, {0x0, 0x6, 0x23800, 0x8, 0x5, 0xfffffffffffffff6, 0x80000000000, 0x7}, {0x1, 0x7, 0x8, 0xc1c}, 0x1, 0x0, 0x2, 0x0, 0x2, 0x1}, {{@in6=@empty, 0x4d5, 0x32}, 0xa, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x3503, 0x4, 0x0, 0x7f, 0x1, 0xfff, 0x7}}, 0xe8) 01:36:44 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 1: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000040)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000180)=0xe8) unshare(0x2c020400) unshare(0x20000400) 01:36:44 executing program 5: unshare(0x2c020400) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:44 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) unshare(0x2c020400) unshare(0x480) 01:36:44 executing program 0: unshare(0x2c020400) unshare(0x4000400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:44 executing program 1: unshare(0x24010c00) unshare(0x10020400) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 01:36:44 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@mcast2, r5}, 0x14) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) unshare(0x480) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 0: unshare(0x2c020400) r0 = getpgid(0x0) r1 = getpgid(r0) tgkill(0xffffffffffffffff, r1, 0x15) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000280)={0x7fff, {{0xa, 0x4e20, 0xd8b9, @loopback, 0x800}}}, 0x88) sched_rr_get_interval(r0, &(0x7f0000000000)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000180)=""/247) 01:36:44 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:44 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@private2}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) unshare(0x2c020400) unshare(0x480) 01:36:44 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:44 executing program 0: msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/150) 01:36:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:45 executing program 1: unshare(0x2c020400) unshare(0x20000400) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000000)={0x8, 0x4f, "da7d6b786e9271c17a2b9ec8974fcbb0e015b06d63101d01f9a81db0930b484a4bc1d9f9213bd5f06e9c4752be282c0797278a72cb09ccb6fe47c7942494ebb5257887919465c37729a508dbe2f2bf"}) socket(0x2b, 0x800, 0x40) 01:36:45 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) unshare(0x480) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 0: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) set_mempolicy(0x1, &(0x7f0000000100), 0xb49) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/148) 01:36:45 executing program 5: unshare(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:45 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) unshare(0x2c020400) unshare(0x480) 01:36:45 executing program 1: unshare(0x2c020400) unshare(0x20000400) geteuid() ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@dev={0xfe, 0x80, '\x00', 0x40}, 0x1, 0x2, 0x2, 0x8, 0x2, 0x6}, 0x20) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 0: unshare(0x2c020400) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000400), 0x40, 0x0) r1 = accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}, &(0x7f0000000440)=0x1c) getsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000280)=""/233, &(0x7f0000000080)=0xe9) r2 = msgget(0x2, 0x889921364529dd8e) msgrcv(r2, &(0x7f0000000180)={0x0, ""/192}, 0xc8, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000003c0)) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000380)={@loopback, 0x2, r3}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000480)={{0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2e2}, {0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00', 0x80000000}, 0x4, [0x3ff, 0x5, 0x2, 0x0, 0x10000, 0x5, 0x100, 0x5]}, 0x5c) 01:36:45 executing program 5: unshare(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:45 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x2c020400) unshare(0x480) 01:36:45 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 1: unshare(0x2c020400) unshare(0x20000400) unshare(0x22000500) 01:36:45 executing program 0: unshare(0x2c020400) msgget$private(0x0, 0x722) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/145) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) unshare(0x480) 01:36:45 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:45 executing program 5: unshare(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:45 executing program 1: unshare(0x2c020400) kexec_load(0x3, 0x6, &(0x7f00000003c0)=[{&(0x7f0000000000)="ee4589b52e09f0464a55", 0xa, 0xd8c1, 0x3}, {&(0x7f0000000040)="fa1abb3d1e7fac515c4ac713cfd87718f03e84b559e47df38aa3501ae698b1150189828feb6cc2c4f20cef2311b9f6235ee05f3f5213f830c770f7b12d3eaad6c66db01c766e482b897cd46d565f6140083554b5e7839de598a6b36bbec8456a8d4c2d4f8e3f4e48982c880e2292923731535e34726e5e33dc91c5cb55bc6668c616ee61f56a167a5a48f142c1ab38c033c9a6aa16d5b4d39b02c6874406424c1b41e57a741b98c4cda64a1de5289226724c62fcbb89ba13e3f1319cf50ac59225ede934893a4e34c8dfeb2250340e49668663a4bbbafa", 0xd7, 0x6, 0x5}, {&(0x7f0000000140)="eabdba197e46a72363e8665366b65edc7ee5bdd4cd0b456bbd25f5be613a0c2630b812eee9d74fac42a91f7d071c2189305d0a0f395357efd99aa602d8578370afe95d6c57bb38f2e2a158597f9519e13404485989b9af7c89734770b4b2072bebb5d17de30ecfec02db0c115489a9e6c1f2fd7cbe23a8f5f543ffc820dc6ba7feec05b2337efb4814177bdcca3e13abfdc15ad789990a7126a949f78300d478a51c5d9e76f65a660391d4217264b08dab12f5e11f3bf2e2d986a8852261653ba4899dd5", 0xc4, 0x3, 0x100}, {&(0x7f0000000240)="0d92be3c95343dd3c4225f2f72013707e1409c095fa1ec4e00b53c2f87804979f34347360e34f1a84335dfa59a75", 0x2e, 0x3, 0x7fffffff}, {&(0x7f0000000280)="4864c6c2bc67084d941f7159ef13328020a10b6d9e9c652d6a32b66e83fafdd13c5e4b54db293cffcc765de55a87cbd1eb5272e3168d0b82ab94ae69671e802a92e420de08dc368afd7fd94e786259cdaef2752849fdf15347ce4264ab93638eba0a9c7845096f201d3cd9d4524ab65be94fa36423e071aacd1a6d7009", 0x7d, 0x5, 0x1}, {&(0x7f0000000300)="a6bd214b63faaf2df2cbc7953ae82d1d9b7ca6f9953763401be1e134b8f82f55ce3e66521831cf7ff838d260aa21813d0ca9b8c74f30e50ac52b96baf18c0c3bbba58c4f8b34949e0e4e07f6a1bd4de007d4c2bd4bf557b59761c55f6c79509ecfe5f067b7a4bc1ca5f59d6eaa6f5d59c1915726346aef6d9fd9631c527aaeda762b", 0x82, 0x9, 0x800}], 0x2a0000) unshare(0x20000400) 01:36:45 executing program 3: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) unshare(0x2c020400) unshare(0x480) 01:36:45 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:45 executing program 0: unshare(0x2c020400) prctl$PR_GET_SECUREBITS(0x1b) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) socket$nl_generic(0x10, 0x3, 0x10) 01:36:45 executing program 5: unshare(0x2c020400) socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 3: unshare(0x2c020400) unshare(0x480) 01:36:45 executing program 2: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:45 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) ptrace$pokeuser(0x6, r0, 0x7fffffff, 0x0) 01:36:45 executing program 5: unshare(0x2c020400) socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:45 executing program 0: unshare(0x2c020400) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/158) 01:36:45 executing program 3: unshare(0x0) unshare(0x480) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 1: ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000080)) unshare(0x2c020400) unshare(0x56040080) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000000)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x301800, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x1) 01:36:45 executing program 3: unshare(0x0) unshare(0x480) 01:36:45 executing program 5: unshare(0x2c020400) socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) 01:36:45 executing program 0: unshare(0x67312061cddd4284) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 1: unshare(0x2c020400) unshare(0x2c000500) unshare(0x40000200) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="e426c65bbbef7422d3a025f93bbaecf36f090e5b09c7017272e4ea446a8e3a8a1aa4dca7c6e56afd6db1d595f21d7577533b441a14fb65e94b59a8578b5264618ff23ed617b4212e5e75d04f131b1afe1cc231ca00e308a06a090815887a7e89ac5416608d12d79adc5a0d4fc5760078a4976a8ea5c68fe52073eec4149db65dde51babccc28624c292c93b4f4009dbda1c4f0e9ff5e877cfa56b5a4e52e8fe2e16781cf8560bf58172b2b4c47f3c3d404abdad46b58dda40f77b689e59b2a5722bffbf57ec64a0a6856688d851669147ca1d969549210d502d0c47d2138ea9e6cdb46b05347a1f71bb20423b7ba55dbf8", 0xf1) unshare(0x500) 01:36:45 executing program 3: unshare(0x0) unshare(0x480) 01:36:45 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) io_cancel(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000180)="e0bfcf8943e4b44c9daed1646aae1ee0fb04b98062f434469532bd449cf90da57c6c2e53b715970e6299d51e5bd9704591af1e83777a989b39cac1d440b3cacfb204819b23ca70f101ebda63f0605c1f8c3031bf2ce82c72ef256174d4bcbcbf88375e2d4ad3ade6ac4bbf14b8baa7ddea2434bb4e9434c217504b6bf2f455d1b209d4b04a24196b733650ac941d867d167db9776634ded588ee16fd1cac5755a5e8189ad8952504cd9eb3cd339e7b6f936f08e481a200b39fa63af188134c29e6d1470ba1dec391c6bd2781c9d62bbb0000000000000000", 0xd8, 0x200, 0x0, 0x1}, &(0x7f0000000040)) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 3: unshare(0x2c020400) unshare(0x0) 01:36:45 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:45 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/16}, 0x18, 0x3, 0x3800) unshare(0x10000400) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000180)=""/4096) 01:36:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 1: unshare(0x2c020400) unshare(0x20000400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/cpuidle', 0xc0000, 0xa4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x2000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_client}, {@cache_loose}, {@access_user}], [{@hash}, {@uid_eq={'uid', 0x3d, r1}}]}}) 01:36:45 executing program 3: unshare(0x2c020400) unshare(0x0) 01:36:45 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:45 executing program 0: unshare(0x28020600) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@dev, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) 01:36:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 1: unshare(0xc020400) unshare(0x20000400) unshare(0x52008d00) 01:36:45 executing program 3: unshare(0x2c020400) unshare(0x0) 01:36:45 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1}, 0x1c) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:45 executing program 0: getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5, 0x2, 0x0, 0x1, 0x4, 0x2}, &(0x7f0000000080)=0x20) unshare(0x2c020400) unshare(0x60ec707db5393bc1) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000400) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x4000, 0x0) inotify_add_watch(r0, &(0x7f00000001c0)='./file0\x00', 0x61000411) openat$sysfs(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(0x0, r0) 01:36:45 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:45 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) set_mempolicy(0x1, &(0x7f0000000100), 0xb49) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/148) 01:36:45 executing program 1: unshare(0x2c020400) unshare(0x20000400) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x29, 0x8b, 0x8d, 0x7ff, 0x60, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, 0x20, 0x40, 0x7, 0xfffffff8}}) 01:36:45 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:45 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:45 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) set_mempolicy(0x1, &(0x7f0000000100), 0xb49) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/148) 01:36:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(0x0, r0) 01:36:45 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) unshare(0x20100) 01:36:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:45 executing program 1: unshare(0x2c020400) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x4}, 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1216040}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008044}, 0x10) unshare(0x20000400) 01:36:45 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) set_mempolicy(0x1, &(0x7f0000000100), 0xb49) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/148) 01:36:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(0x0, r0) 01:36:45 executing program 0: unshare(0x58060b00) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) msgctl$IPC_RMID(0x0, 0x0) 01:36:45 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:46 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:46 executing program 0: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futex(&(0x7f0000000000), 0x1, 0x2, &(0x7f0000000040)={r0, r1+60000000}, &(0x7f0000000080)=0x80000200, 0x1) unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000180)) 01:36:46 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) set_mempolicy(0x1, &(0x7f0000000100), 0xb49) 01:36:46 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x4, 0x200002) r1 = syz_open_dev$vcsn(&(0x7f0000002140), 0xffffffffffffff80, 0x10300) io_submit(0x0, 0x3, &(0x7f00000021c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x8, 0xffffffffffffffff, &(0x7f0000000000)="2e55f9bf2577e5668e7490a455c7860da2432b7c0ea9ce6cbf610a1f4ff2d054de7feaa4344ac32694d03ed9d37d0ef8959cf3dd343765e08fd6ed1e8e2380f006df110d29ace9ed3157794df41bae9582df2c62401ce49df5659f919ae013032e8bf0c7f605f9a486cc647a294c073b73", 0x71, 0x41a, 0x0, 0x1, r0}, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x1f, 0xffffffffffffffff, &(0x7f0000000100)="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", 0x1000, 0x2, 0x0, 0x2}, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x7, 0x57e, 0xffffffffffffffff, &(0x7f0000001140)="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", 0x1000, 0x931, 0x0, 0x0, r1}]) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000002200), &(0x7f0000002240)=0x4) unshare(0x2c020400) unshare(0x20000400) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000002280)={{0xa, 0x4e23, 0x3ff, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}, {0xa, 0x4e24, 0x6bf8, @private0, 0x425}, 0x7ff, [0x915, 0xb2, 0x7, 0x6, 0xeceb, 0x132, 0x1, 0x1ff]}, 0x5c) 01:36:46 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:46 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:46 executing program 5: unshare(0x2c020400) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:46 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:46 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:46 executing program 1: unshare(0x2c020400) unshare(0x10000000) unshare(0x20000400) 01:36:46 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 5: unshare(0x2c020400) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:46 executing program 0: unshare(0x2c020400) msgsnd(0x0, &(0x7f0000000000)={0x2, "5e89ad6dbafd30ffb82f6de12f0dbc6360e4674c851ce0969c8444171b098af675a4a8b101352bf42fc41a2c8786e4538600ccb6ac98f95fe9c574913ff5eaf8b473b044dc0ce5f4fc9a6158ef5324176a6c36ac6fa0fe20f63d5cefce604916bc2582fc66236ca72d358449cab72b0977046cb4a68c6049c0bda86180eae3dd7e0eaeb7a6a2bd0f70e2cf2ee740c20501be0d834f97e52956092a656fa219d74197"}, 0xaa, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:46 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(0x0, r0) 01:36:46 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:46 executing program 5: unshare(0x2c020400) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:46 executing program 3: unshare(0x2c020400) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:46 executing program 1: unshare(0x2c020400) unshare(0x60021400) unshare(0x8010000) 01:36:46 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = msgget$private(0x0, 0x0) set_tid_address(&(0x7f0000000000)) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000040)=""/61) 01:36:46 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(0x0, r0) 01:36:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:46 executing program 2: unshare(0x2c020400) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:46 executing program 3: unshare(0x2c020400) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:46 executing program 1: unshare(0x40840) unshare(0x20000400) ioprio_get$uid(0x0, 0xffffffffffffffff) 01:36:46 executing program 0: unshare(0x2c020400) unshare(0x800) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@tipc=@id, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000180), &(0x7f00000001c0)=0x4) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:46 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(0x0, r0) 01:36:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:46 executing program 2: unshare(0x2c020400) unshare(0x20000400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 3: unshare(0x2c020400) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:46 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:46 executing program 0: unshare(0x2c020400) msgctl$IPC_RMID(0x0, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/163) 01:36:46 executing program 1: unshare(0x2c020400) unshare(0x20030b80) unshare(0x480) 01:36:46 executing program 2: unshare(0x2c020400) unshare(0x20000400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:46 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:46 executing program 0: unshare(0x18020480) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x80003, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r0) sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0xf4, r2, 0x10, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffc}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_virt_wifi\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'wlan0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x253}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80000001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4d4d}]}]}, 0xf4}}, 0x44) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x1) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/152) prctl$PR_CAPBSET_READ(0x17, 0x19) 01:36:46 executing program 2: unshare(0x2c020400) unshare(0x20000400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 5: unshare(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:46 executing program 1: setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@empty, 0x4e21, 0x0, 0x4e23, 0x20, 0xa, 0x80, 0xa0, 0x1d, 0x0, 0xee01}, {0x2, 0x8, 0x400000000000, 0x9, 0x6, 0x3f, 0x6, 0x65a6}, {0x1000, 0x1ff, 0x1, 0x3}, 0x0, 0x6e6bb9, 0x2, 0x1, 0x7}, {{@in=@broadcast, 0x4d6, 0x3c}, 0xa, @in=@multicast2, 0x3507, 0x2, 0x2, 0x6, 0x80000000, 0x80, 0x7}}, 0xe8) unshare(0x2c020400) unshare(0x20000400) 01:36:46 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 5: unshare(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:46 executing program 1: unshare(0x2050000) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/mac80211', 0x20080, 0x2) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) unshare(0x10000200) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/block', 0x80, 0x81) unshare(0x200) unshare(0x70800) prctl$PR_SVE_GET_VL(0x33, 0x4499) setgid(0xee01) 01:36:46 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 2: unshare(0x2c020400) unshare(0x20000400) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 5: unshare(0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, 0x0, 0x0) 01:36:46 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), 0xffffffffffffffff) 01:36:46 executing program 1: unshare(0x2c020400) unshare(0x20000400) sysfs$2(0x2, 0x80000001, &(0x7f0000000000)) 01:36:46 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x3, 0x0, 0xffffffffffffffff, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffe, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) r1 = msgget$private(0x0, 0x402) r2 = geteuid() getresgid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) r4 = gettid() ptrace$pokeuser(0x6, r4, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000200)={{0x0, r2, r3, 0xee01, 0x0, 0x20, 0x1}, 0x0, 0x0, 0x16, 0xca2, 0x1, 0x5, 0x4, 0xf860, 0x9, 0x3, 0x0, r4}) r5 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) r6 = msgget(0x1, 0x131) msgctl$IPC_INFO(r6, 0x3, &(0x7f00000000c0)=""/166) msgctl$MSG_INFO(r6, 0xc, &(0x7f0000000280)=""/3) 01:36:46 executing program 5: unshare(0x2c020400) socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:46 executing program 3: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:46 executing program 2: unshare(0x2c020400) unshare(0x20000400) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 1: ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000000)) unshare(0x2c020400) unshare(0x8040200) 01:36:46 executing program 3: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 5: unshare(0x2c020400) socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:46 executing program 2: unshare(0x2c020400) unshare(0x20000400) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:46 executing program 3: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@private2, 0x15}) 01:36:46 executing program 1: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) unshare(0x2c020400) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e23, 0xffff, @mcast2, 0x7fff}, {0xa, 0x4e20, 0x6, @empty, 0x4cc}, 0x2, [0x710, 0x9, 0x4, 0x9, 0x2, 0x101, 0x6, 0x2]}, 0x5c) unshare(0x20000400) unshare(0x100) 01:36:46 executing program 5: unshare(0x2c020400) socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:36:46 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 4: ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000180)) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private2, 0x0, 0x101, 0x0, 0x0, 0x0, 0x80240}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) unshare(0x2c020400) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000480), r0) 01:36:46 executing program 0: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/pcmcia', 0x2000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x200000, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c616e616d653d2f2d24002c616669643d3078303030303006303030303030303030342c64666c747569643d", @ANYRESHEX=0x0, @ANYBLOB="2c78bad0fbe1acc7a0add62ff268e173682c736d61630000000101", @ANYRESDEC=0x0, @ANYBLOB=',hash,dont_hash,appraise_type=imasig,\x00']) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:46 executing program 1: unshare(0x2c020400) unshare(0x0) 01:36:46 executing program 4: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 5: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) 01:36:46 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 1: unshare(0x2c020400) unshare(0x20000000) unshare(0x20000400) 01:36:46 executing program 0: unshare(0x2c020400) unshare(0x4c000900) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:46 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:46 executing program 4: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:46 executing program 5: unshare(0x2c020400) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/pcmcia', 0x2000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x200000, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c616e616d653d2f2d24002c616669643d3078303030303006303030303030303030342c64666c747569643d", @ANYRESHEX=0x0, @ANYBLOB="2c78bad0fbe1acc7a0add62ff268e173682c736d61630000000101", @ANYRESDEC=0x0, @ANYBLOB=',hash,dont_hash,appraise_type=imasig,\x00']) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:46 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 1: unshare(0x2c030400) unshare(0x8000000) unshare(0x20000400) 01:36:47 executing program 0: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/168) 01:36:47 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 4: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 1: unshare(0x2c020400) r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @private1, 0x8}, 0x1c) r1 = msgget(0x2, 0x1) msgctl$IPC_INFO(r1, 0x3, &(0x7f00000000c0)=""/166) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x2a680, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) 01:36:47 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x44680) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x3, 0x5, 0x40, @mcast1, @mcast2, 0x7800, 0x700, 0x2, 0xba28}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0xb, r0}) 01:36:47 executing program 2: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 0: msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:47 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x44680) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x3, 0x5, 0x40, @mcast1, @mcast2, 0x7800, 0x700, 0x2, 0xba28}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0xb, r0}) 01:36:47 executing program 0: unshare(0x2c020400) unshare(0x20020500) 01:36:47 executing program 4: unshare(0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:47 executing program 2: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 1: unshare(0x2c020400) unshare(0x20000) unshare(0xa020000) 01:36:47 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x44680) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x3, 0x5, 0x40, @mcast1, @mcast2, 0x7800, 0x700, 0x2, 0xba28}}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@private2={0xfc, 0x2, '\x00', 0x1}, 0xb, r0}) 01:36:47 executing program 0: unshare(0x6c020200) unshare(0x20000400) 01:36:47 executing program 3: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:47 executing program 4: unshare(0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:47 executing program 2: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 1: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) unshare(0xa020000) 01:36:47 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x44680) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0x3, 0x5, 0x40, @mcast1, @mcast2, 0x7800, 0x700, 0x2, 0xba28}}) 01:36:47 executing program 4: unshare(0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:47 executing program 0: unshare(0x6c020200) unshare(0x20000400) 01:36:47 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 5: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x44680) 01:36:47 executing program 3: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 1: unshare(0x2c020400) accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) 01:36:47 executing program 0: unshare(0x6c020200) unshare(0x20000400) 01:36:47 executing program 5: unshare(0x2c020400) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x44680) 01:36:47 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 1: unshare(0x2c020400) unshare(0x20000) syz_open_dev$sg(&(0x7f0000000040), 0x81, 0x88000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)=0x2, 0x4) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) geteuid() unshare(0xa020000) 01:36:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 3: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:47 executing program 0: unshare(0x20000400) 01:36:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) unshare(0x2c030000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r6 = getpid() sched_setaffinity(r6, 0x8, &(0x7f0000000300)=0x1) 01:36:47 executing program 5: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x44680) 01:36:47 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x80300, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 3: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x4, &(0x7f00000000c0)=""/166) 01:36:47 executing program 0: unshare(0x20000400) 01:36:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) unshare(0x2c030000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r6 = getpid() sched_setaffinity(r6, 0x8, &(0x7f0000000300)=0x1) 01:36:47 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x44680) 01:36:47 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) unshare(0x2c030000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) r6 = getpid() sched_setaffinity(r6, 0x8, &(0x7f0000000300)=0x1) 01:36:47 executing program 0: unshare(0x20000400) 01:36:47 executing program 3: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x4, &(0x7f00000000c0)=""/166) 01:36:47 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x44680) 01:36:47 executing program 2: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 0: unshare(0x0) unshare(0x20000400) 01:36:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x2080, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) unshare(0x2c030000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) getpid() 01:36:47 executing program 5: syz_open_dev$sg(0x0, 0x0, 0x44680) 01:36:47 executing program 2: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 3: unshare(0x2c020400) msgctl$IPC_INFO(0x0, 0x4, &(0x7f00000000c0)=""/166) 01:36:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) unshare(0x2c030000) msgctl$IPC_INFO(0x0, 0x3, &(0x7f00000000c0)=""/166) 01:36:47 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:47 executing program 0: unshare(0x0) unshare(0x20000400) 01:36:47 executing program 5: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 01:36:47 executing program 2: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:47 executing program 3: msgctl$IPC_INFO(0x0, 0x4, &(0x7f00000000c0)=""/166) 01:36:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) unshare(0x2c030000) 01:36:47 executing program 0: unshare(0x0) unshare(0x20000400) 01:36:47 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:47 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:47 executing program 5: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 01:36:47 executing program 3: msgctl$IPC_INFO(0x0, 0x4, 0x0) 01:36:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:47 executing program 0: unshare(0x6c020200) unshare(0x0) 01:36:47 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:47 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:47 executing program 5: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 01:36:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) r5 = gettid() rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:47 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:47 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:47 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:48 executing program 5: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r0, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xab1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10000}, 0x40) unshare(0x2c020400) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x200040) ioctl$RTC_IRQP_READ(r1, 0x8008700b, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x80000) socket(0x2b, 0x800, 0xc696) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000300), 0x800) 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) rt_tgsigqueueinfo(r4, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 0: unshare(0x6c020200) unshare(0x0) 01:36:48 executing program 4: unshare(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/ata_device', 0x0, 0x0) io_setup(0x1, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffff, r2, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1, r0}]) 01:36:48 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:48 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) rt_tgsigqueueinfo(r4, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) rt_tgsigqueueinfo(r4, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 0: unshare(0x6c020200) unshare(0x0) 01:36:48 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:48 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) rt_tgsigqueueinfo(r4, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 902.843919][T18595] FAULT_INJECTION: forcing a failure. [ 902.843919][T18595] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 902.857215][T18595] CPU: 0 PID: 18595 Comm: syz-executor.4 Not tainted 5.13.0-rc5-syzkaller #0 [ 902.865979][T18595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.876365][T18595] Call Trace: [ 902.879652][T18595] dump_stack+0x137/0x19d [ 902.883996][T18595] should_fail+0x23c/0x250 [ 902.888421][T18595] should_fail_usercopy+0x16/0x20 01:36:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) rt_tgsigqueueinfo(r4, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() r5 = gettid() rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = gettid() rt_tgsigqueueinfo(0x0, r4, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 902.893460][T18595] _copy_to_user+0x1c/0x90 [ 902.897967][T18595] simple_read_from_buffer+0xab/0x120 [ 902.903387][T18595] proc_fail_nth_read+0xf6/0x140 [ 902.908373][T18595] ? rw_verify_area+0x136/0x250 [ 902.913249][T18595] ? proc_fault_inject_write+0x200/0x200 [ 902.918921][T18595] vfs_read+0x154/0x5d0 [ 902.923094][T18595] ? __fget_light+0x21b/0x260 [ 902.927839][T18595] ? __cond_resched+0x11/0x40 [ 902.932600][T18595] ksys_read+0xce/0x180 [ 902.937816][T18595] __x64_sys_read+0x3e/0x50 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = gettid() rt_tgsigqueueinfo(0x0, r4, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r1, r4, 0x33, &(0x7f0000000200)={0x1c, 0x6, 0x5}) rt_tgsigqueueinfo(r4, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 902.942371][T18595] do_syscall_64+0x4a/0x90 [ 902.946891][T18595] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 902.952794][T18595] RIP: 0033:0x41935c [ 902.956690][T18595] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 902.976428][T18595] RSP: 002b:00007ff180fb1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 902.984857][T18595] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = gettid() rt_tgsigqueueinfo(0x0, r4, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) r4 = getpid() rt_tgsigqueueinfo(r4, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) r4 = getpid() r5 = gettid() rt_tgsigqueueinfo(r4, r5, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:48 executing program 0: unshare(0x6c020200) unshare(0x0) [ 902.992844][T18595] RDX: 000000000000000f RSI: 00007ff180fb11e0 RDI: 0000000000000003 [ 903.000849][T18595] RBP: 00007ff180fb11d0 R08: 0000000000000000 R09: 0000000000000000 [ 903.008852][T18595] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.016824][T18595] R13: 00007fff1697268f R14: 00007ff180fb1300 R15: 0000000000022000 01:36:48 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) r3 = getpid() r4 = gettid() rt_tgsigqueueinfo(r3, r4, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000340)={@ipv4={'\x00', '\xff\xff', @loopback}, 0x61, r3}) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:48 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x0, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 0: unshare(0x6c020200) unshare(0x0) 01:36:48 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) r3 = getpid() r4 = gettid() rt_tgsigqueueinfo(r3, r4, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x4200, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:48 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x0, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 0 (fault-call:1 fault-nth:0): unshare(0x6c020200) unshare(0x20000400) 01:36:48 executing program 1: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) r1 = getpgrp(r0) ptrace$poke(0xffffffffffffffff, r1, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r0, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) r2 = getpid() r3 = gettid() rt_tgsigqueueinfo(r2, r3, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 3: unshare(0x2c020400) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x0, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x109001, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:48 executing program 1: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) r1 = getpgrp(r0) ptrace$poke(0xffffffffffffffff, r1, &(0x7f00000001c0), 0xdd16) r2 = getpid() r3 = gettid() rt_tgsigqueueinfo(r2, r3, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = getpgrp(r1) ptrace$poke(0xffffffffffffffff, r2, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r1, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'ip6_vti0\x00', 0x0, 0x29, 0x8, 0x1, 0x9, 0x50, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1, 0x40, 0x1, 0x1b}}) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 903.343763][T18676] FAULT_INJECTION: forcing a failure. [ 903.343763][T18676] name failslab, interval 1, probability 0, space 0, times 0 [ 903.356732][T18676] CPU: 0 PID: 18676 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 903.365585][T18676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.375741][T18676] Call Trace: [ 903.379109][T18676] dump_stack+0x137/0x19d 01:36:48 executing program 3: unshare(0x2c020400) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 1: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) getpgrp(r0) r1 = getpid() r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 903.379165][T18676] should_fail+0x23c/0x250 [ 903.379179][T18676] ? dup_fd+0x48/0x6e0 [ 903.379225][T18676] __should_failslab+0x81/0x90 01:36:48 executing program 0 (fault-call:1 fault-nth:1): unshare(0x6c020200) unshare(0x20000400) 01:36:48 executing program 5: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) r1 = getpgrp(r0) ptrace$poke(0xffffffffffffffff, r1, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(r0, 0x0, 0x34, &(0x7f0000000000)={0x40, 0x9, 0x818}) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:48 executing program 3: unshare(0x2c020400) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) [ 903.379245][T18676] should_failslab+0x5/0x20 [ 903.379332][T18676] kmem_cache_alloc+0x46/0x2f0 01:36:48 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:48 executing program 1: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) r1 = getpid() r2 = gettid() rt_tgsigqueueinfo(r1, r2, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 903.379351][T18676] dup_fd+0x48/0x6e0 [ 903.379368][T18676] ? __fget_light+0x21b/0x260 01:36:48 executing program 5: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) r1 = getpgrp(r0) ptrace$poke(0xffffffffffffffff, r1, &(0x7f00000001c0), 0xdd16) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 903.379386][T18676] ksys_unshare+0x301/0x710 [ 903.379513][T18676] __x64_sys_unshare+0x1b/0x20 [ 903.379604][T18676] do_syscall_64+0x4a/0x90 [ 903.379626][T18676] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 903.379710][T18676] RIP: 0033:0x4665d9 [ 903.379724][T18676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 903.379741][T18676] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 903.379759][T18676] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 903.379772][T18676] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000400 [ 903.379834][T18676] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 903.379845][T18676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.379857][T18676] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 [ 903.552551][T18715] FAULT_INJECTION: forcing a failure. [ 903.552551][T18715] name failslab, interval 1, probability 0, space 0, times 0 [ 903.552574][T18715] CPU: 1 PID: 18715 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 903.552592][T18715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.552602][T18715] Call Trace: [ 903.552608][T18715] dump_stack+0x137/0x19d [ 903.552627][T18715] should_fail+0x23c/0x250 [ 903.552641][T18715] __should_failslab+0x81/0x90 [ 903.552722][T18715] ? alloc_fdtable+0x7d/0x1b0 [ 903.552744][T18715] should_failslab+0x5/0x20 [ 903.552780][T18715] kmem_cache_alloc_trace+0x49/0x310 [ 903.552799][T18715] alloc_fdtable+0x7d/0x1b0 [ 903.552815][T18715] dup_fd+0x548/0x6e0 [ 903.552829][T18715] ? __fget_light+0x21b/0x260 [ 903.552871][T18715] ksys_unshare+0x301/0x710 [ 903.552889][T18715] __x64_sys_unshare+0x1b/0x20 [ 903.552905][T18715] do_syscall_64+0x4a/0x90 [ 903.552923][T18715] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 903.552972][T18715] RIP: 0033:0x4665d9 [ 903.552984][T18715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 903.553001][T18715] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 903.553019][T18715] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:36:49 executing program 0 (fault-call:1 fault-nth:2): unshare(0x6c020200) unshare(0x20000400) 01:36:49 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:49 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 1: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) gettid() r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 5: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) getpgrp(r0) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 903.553033][T18715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000400 [ 903.553050][T18715] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 903.553062][T18715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 903.553073][T18715] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 [ 903.953417][T18749] FAULT_INJECTION: forcing a failure. [ 903.953417][T18749] name failslab, interval 1, probability 0, space 0, times 0 [ 903.966343][T18749] CPU: 0 PID: 18749 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 903.975323][T18749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.985425][T18749] Call Trace: [ 903.988761][T18749] dump_stack+0x137/0x19d [ 903.993136][T18749] should_fail+0x23c/0x250 [ 903.997768][T18749] __should_failslab+0x81/0x90 [ 904.002792][T18749] should_failslab+0x5/0x20 [ 904.007330][T18749] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 904.013110][T18749] ? __kmalloc_node+0x30/0x40 [ 904.017895][T18749] __kmalloc_node+0x30/0x40 [ 904.022427][T18749] kvmalloc_node+0x81/0xf0 [ 904.026899][T18749] alloc_fdtable+0xae/0x1b0 [ 904.031436][T18749] dup_fd+0x548/0x6e0 [ 904.035439][T18749] ? __fget_light+0x21b/0x260 [ 904.040198][T18749] ksys_unshare+0x301/0x710 [ 904.044823][T18749] __x64_sys_unshare+0x1b/0x20 [ 904.055477][T18749] do_syscall_64+0x4a/0x90 [ 904.059906][T18749] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 904.065821][T18749] RIP: 0033:0x4665d9 [ 904.069766][T18749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 904.090019][T18749] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 01:36:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000100)) ioctl$RTC_AIE_OFF(r0, 0x7002) ioctl$RTC_UIE_ON(r0, 0x7003) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) 01:36:49 executing program 1: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 5: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 5: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) gettid() rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 904.098470][T18749] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 904.106470][T18749] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000400 [ 904.114663][T18749] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 904.122665][T18749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 904.130648][T18749] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 01:36:49 executing program 0 (fault-call:1 fault-nth:3): unshare(0x6c020200) unshare(0x20000400) 01:36:49 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x0, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 1: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x16340, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) 01:36:49 executing program 5: syz_open_dev$vcsa(&(0x7f0000000180), 0x7, 0x410080) rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) [ 904.226017][T18786] FAULT_INJECTION: forcing a failure. [ 904.226017][T18786] name failslab, interval 1, probability 0, space 0, times 0 [ 904.238786][T18786] CPU: 0 PID: 18786 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 904.247640][T18786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.257737][T18786] Call Trace: [ 904.261034][T18786] dump_stack+0x137/0x19d [ 904.265482][T18786] should_fail+0x23c/0x250 [ 904.270622][T18786] __should_failslab+0x81/0x90 [ 904.275541][T18786] should_failslab+0x5/0x20 [ 904.280089][T18786] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 904.285864][T18786] ? __kmalloc_node+0x30/0x40 [ 904.290598][T18786] __kmalloc_node+0x30/0x40 [ 904.295127][T18786] kvmalloc_node+0x81/0xf0 [ 904.299640][T18786] alloc_fdtable+0x112/0x1b0 [ 904.304235][T18786] dup_fd+0x548/0x6e0 [ 904.308252][T18786] ? __fget_light+0x21b/0x260 [ 904.312985][T18786] ksys_unshare+0x301/0x710 [ 904.317618][T18786] __x64_sys_unshare+0x1b/0x20 [ 904.322603][T18786] do_syscall_64+0x4a/0x90 [ 904.327041][T18786] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 904.333005][T18786] RIP: 0033:0x4665d9 [ 904.336913][T18786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 904.358112][T18786] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 904.366806][T18786] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:36:49 executing program 1: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 3: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 3: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 3: unshare(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) [ 904.375002][T18786] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000400 [ 904.383189][T18786] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 904.391241][T18786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 904.399351][T18786] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 01:36:49 executing program 0 (fault-call:1 fault-nth:4): unshare(0x6c020200) unshare(0x20000400) 01:36:49 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x0, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 1: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@remote, @in=@remote, 0x4e24, 0x7, 0x4e21, 0x486d, 0x2, 0xa0, 0x20, 0x73, 0x0, 0xee00}, {0x5, 0x1, 0x2, 0x2051, 0x6, 0x2, 0x0, 0x33f4c9bd}, {0x2, 0x0, 0x2aad9272, 0xc3}, 0x2, 0x6e6bb8, 0x1, 0x0, 0x1, 0x3}, {{@in6=@loopback, 0x4d5, 0x32}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x1e}, 0x34ff, 0x4, 0x3, 0x4, 0x6, 0x3ff, 0x80000001}}, 0xe8) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:49 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) 01:36:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000040)={0x37, 0xd, 0xf, 0xb, 0x1, 0x8001, 0x5, 0xb7, 0x1}) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:49 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) 01:36:49 executing program 1: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:49 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x0, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:49 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) [ 904.550292][T18841] FAULT_INJECTION: forcing a failure. [ 904.550292][T18841] name failslab, interval 1, probability 0, space 0, times 0 [ 904.563621][T18841] CPU: 1 PID: 18841 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 904.572415][T18841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.583141][T18841] Call Trace: 01:36:50 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) [ 904.583152][T18841] dump_stack+0x137/0x19d [ 904.583177][T18841] should_fail+0x23c/0x250 [ 904.583192][T18841] ? create_new_namespaces+0x3c/0x560 [ 904.583212][T18841] __should_failslab+0x81/0x90 [ 904.583269][T18841] should_failslab+0x5/0x20 [ 904.583286][T18841] kmem_cache_alloc+0x46/0x2f0 [ 904.583305][T18841] create_new_namespaces+0x3c/0x560 01:36:50 executing program 0 (fault-call:1 fault-nth:5): unshare(0x6c020200) unshare(0x20000400) 01:36:50 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 1: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:50 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x806c, 0x80}) [ 904.583327][T18841] ? security_capable+0x91/0xa0 [ 904.583349][T18841] unshare_nsproxy_namespaces+0xe2/0x120 [ 904.583432][T18841] ksys_unshare+0x381/0x710 [ 904.583464][T18841] __x64_sys_unshare+0x1b/0x20 01:36:50 executing program 3: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) [ 904.583477][T18841] do_syscall_64+0x4a/0x90 [ 904.583504][T18841] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 904.583527][T18841] RIP: 0033:0x4665d9 [ 904.583540][T18841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 904.583555][T18841] RSP: 002b:00007f8e0d07a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 904.583572][T18841] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 904.583583][T18841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000400 [ 904.583593][T18841] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 904.583602][T18841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 904.583613][T18841] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 [ 904.823202][T18880] FAULT_INJECTION: forcing a failure. [ 904.823202][T18880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 904.823226][T18880] CPU: 1 PID: 18880 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 904.823246][T18880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.823256][T18880] Call Trace: [ 904.823262][T18880] dump_stack+0x137/0x19d [ 904.823282][T18880] should_fail+0x23c/0x250 [ 904.823313][T18880] should_fail_usercopy+0x16/0x20 [ 904.823401][T18880] _copy_to_user+0x1c/0x90 [ 904.823449][T18880] simple_read_from_buffer+0xab/0x120 [ 904.823486][T18880] proc_fail_nth_read+0xf6/0x140 [ 904.823501][T18880] ? rw_verify_area+0x136/0x250 [ 904.823519][T18880] ? proc_fault_inject_write+0x200/0x200 [ 904.823563][T18880] vfs_read+0x154/0x5d0 [ 904.823699][T18880] ? __fget_light+0x21b/0x260 [ 904.823716][T18880] ? __cond_resched+0x11/0x40 [ 904.823779][T18880] ksys_read+0xce/0x180 [ 904.823795][T18880] __x64_sys_read+0x3e/0x50 [ 904.823811][T18880] do_syscall_64+0x4a/0x90 [ 904.823830][T18880] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 904.823867][T18880] RIP: 0033:0x41935c [ 904.823880][T18880] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 904.823898][T18880] RSP: 002b:00007f8e0d07a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 01:36:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x240, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) getpeername$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000040)=0x1c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000100)) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:50 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x80}) 01:36:50 executing program 1: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x10036, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:50 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x0, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 3: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 0: unshare(0x6c020200) unshare(0x20000400) [ 904.823916][T18880] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 904.823927][T18880] RDX: 000000000000000f RSI: 00007f8e0d07a1e0 RDI: 0000000000000003 [ 904.823937][T18880] RBP: 00007f8e0d07a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 904.823948][T18880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 904.823958][T18880] R13: 00007ffd8d84904f R14: 00007f8e0d07a300 R15: 0000000000022000 01:36:50 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:50 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)) 01:36:50 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x0, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 3: unshare(0x2c020400) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0xcd, &(0x7f0000000000)=""/137, &(0x7f0000000100)=0x89) accept(r1, &(0x7f0000000140)=@can, &(0x7f00000001c0)=0x80) 01:36:50 executing program 0: futex(&(0x7f0000000000)=0x2, 0x1, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080)=0x2, 0x1) unshare(0x6c020200) clock_getres(0x7, &(0x7f00000000c0)) unshare(0x20000400) 01:36:50 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:50 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)) 01:36:50 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:50 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x0, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000080)=0x40) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0x9) syz_open_dev$vcsn(&(0x7f00000001c0), 0x7fffffff, 0x400401) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000000240)) ioctl$RTC_UIE_ON(r0, 0x7003) r4 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r4, 0x0, 0x0) ioctl$RTC_WIE_ON(r4, 0x700f) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000100)) pipe2$9p(&(0x7f0000000140), 0x84000) 01:36:50 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:50 executing program 0: unshare(0x6c020200) geteuid() r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) unshare(0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r2}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@mcast1, 0x5c, r2}) unshare(0x20000400) 01:36:50 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000280)) 01:36:50 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:50 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/ahci', 0x261c3, 0x102) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000040)="afd28cd983a7a7c2a27e419509007136c0fd79ce0e529d", 0x17) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, &(0x7f0000000100)="c12805cf6d8cff6982b33e8b2b5d4417d87e3f82c96dd931a972f9ca489e2f31710cdca79637e827c8c02270ca2e419072f189d2c71caae5a1a520a2fff57ac2129a7fbff5aacd18167eef09072cd3f1214dd84df6495302e31e6fb596d8cedc6cf615dffbcec114839ee0422d", 0x6d) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) openat$urandom(0xffffffffffffff9c, &(0x7f0000000240), 0x200180, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x180, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) r3 = syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x402080) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000001c0)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) 01:36:50 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, 0x0) 01:36:50 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, 0x0) 01:36:50 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:50 executing program 0: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) ptrace$setopts(0x4200, r1, 0x2000000000006a5, 0x4a) unshare(0x20000400) 01:36:50 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, 0x0) 01:36:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0xb1d) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:50 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:50 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, 0x0) 01:36:50 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:50 executing program 0: unshare(0x74020200) unshare(0x0) unshare(0x20000400) 01:36:50 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x802048, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdn\x00=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',access=', @ANYRESDEC, @ANYBLOB=',func=MODULE_CHECK,uid>', @ANYRESDEC=0xee01, @ANYBLOB="2c736d2f72746330000c726f6f747e75636f6e746578743d7379736164b50e00006606006e65723d0000000000000000000000007b7a00000000000000000014000000", @ANYRESDEC=r2, @ANYBLOB=',audit,dont_measure,obj_type=/dev/rtc0\x00,\x00']) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:50 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x0, 0xffffffffffffffff}}) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, &(0x7f0000000280)={0x0, 0x806c, 0x80}) 01:36:51 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e23, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0xa, 0x4e20, 0x3, @private1, 0xfff}, 0x3f, [0x9, 0x8000, 0x1, 0x0, 0xfffffffe, 0x5, 0x2, 0x2]}, 0x5c) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x5, 0x4601) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x200080c5) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) syz_open_dev$rtc(&(0x7f0000000040), 0x7, 0x202400) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000300)={0x7ff, {{0xa, 0x4e21, 0x50000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xfffffff9}}, 0x0, 0x7, [{{0xa, 0x4e20, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}, 0x4}}, {{0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x2}}, {{0xa, 0x4e22, 0x7fffffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}, {{0xa, 0x4e20, 0x9, @mcast2, 0x5}}, {{0xa, 0x4e23, 0x200, @private0={0xfc, 0x0, '\x00', 0x1}, 0x401}}, {{0xa, 0x4e22, 0x1, @remote, 0xfffff9a9}}, {{0xa, 0x4e20, 0xffffffff, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, 0x7}}]}, 0x410) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:51 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x92548b131f5e8ddc, &(0x7f0000000000)=0xe36, 0x4) unshare(0x6c020200) unshare(0x20000400) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, &(0x7f0000000280)={0x0, 0x0, 0x80}) 01:36:51 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x0, 0xffffffffffffffff}}) 01:36:51 executing program 4: sysfs$2(0x2, 0x9, &(0x7f0000000100)=""/200) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:51 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 0: unshare(0x0) unshare(0x20000400) 01:36:51 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x0, 0xffffffffffffffff}}) 01:36:51 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, &(0x7f0000000280)) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x38, 0x0, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xff}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x20020000}, 0x4040) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), r0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x4) unshare(0x48020c00) 01:36:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x40180, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x8004, 0x69c000) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000100)=@routing={0x2b, 0x10, 0x0, 0x1a, 0x0, [@empty, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x25}, @ipv4={'\x00', '\xff\xff', @empty}, @mcast1, @dev={0xfe, 0x80, '\x00', 0x41}, @private0={0xfc, 0x0, '\x00', 0x1}]}, 0x88) ioctl$RTC_AIE_OFF(r1, 0x7002) 01:36:51 executing program 2: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x3c, 0x10, 0x0, 0x1c, 0x0, 0x1c91}}) 01:36:51 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, &(0x7f0000000280)) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 5: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000000), 0x4, 0x30080) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000040), 0x8, 0x10041) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x202200, 0x0) syz_open_dev$vcsa(&(0x7f0000000100), 0x426e, 0x440000) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:36:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x802048, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdn\x00=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',access=', @ANYRESDEC, @ANYBLOB=',func=MODULE_CHECK,uid>', @ANYRESDEC=0xee01, @ANYBLOB="2c736d2f72746330000c726f6f747e75636f6e746578743d7379736164b50e00006606006e65723d0000000000000000000000007b7a00000000000000000014000000", @ANYRESDEC=r2, @ANYBLOB=',audit,dont_measure,obj_type=/dev/rtc0\x00,\x00']) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:51 executing program 1: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x10036, &(0x7f0000000280)) 01:36:51 executing program 0: unshare(0x6c020200) unshare(0x20000400) prctl$PR_GET_KEEPCAPS(0x7) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 5: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140), 0x140, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000180)) select(0x40, &(0x7f0000000000)={0x1000, 0x7, 0x8, 0x1, 0x1d99, 0x5b, 0xff, 0x1}, &(0x7f0000000040)={0x7, 0x8, 0xff, 0x4, 0x8, 0x7f, 0x3, 0x5eab}, &(0x7f0000000080)={0x101, 0x3, 0x0, 0x1000, 0x800, 0x16, 0x78b, 0x62a}, &(0x7f0000000100)={0x77359400}) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:51 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) ptrace$setopts(0x4200, r1, 0x2000000000006a5, 0x4a) unshare(0x20000400) 01:36:51 executing program 0: unshare(0x6c020200) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0xfff, 0x168000) ioctl$RTC_UIE_OFF(r0, 0x7004) unshare(0x20000400) unshare(0x2000800) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x85000) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000080)) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 5: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x802048, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdn\x00=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',access=', @ANYRESDEC, @ANYBLOB=',func=MODULE_CHECK,uid>', @ANYRESDEC=0xee01, @ANYBLOB="2c736d2f72746330000c726f6f747e75636f6e746578743d7379736164b50e00006606006e65723d0000000000000000000000007b7a00000000000000000014000000", @ANYRESDEC=r2, @ANYBLOB=',audit,dont_measure,obj_type=/dev/rtc0\x00,\x00']) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:51 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/drm_kms_helper', 0x0, 0x22) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000040)) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 5: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) ptrace$setopts(0x4200, r1, 0x2000000000006a5, 0x4a) unshare(0x20000400) 01:36:51 executing program 0: r0 = msgget(0x2, 0x18) msgsnd(r0, &(0x7f0000000000)={0x0, "366a4dc4ae34878e60dd4b3f97fb6b55d4a97af5ff1a1a9bf3257c5520ecf6cf1cba24087adbdebb69246d388b5c3784116de3ab3525e7"}, 0x3f, 0x800) msgctl$IPC_RMID(r0, 0x0) unshare(0x6c020200) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000040)=""/69) unshare(0xe0000000) 01:36:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x802048, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdn\x00=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',access=', @ANYRESDEC, @ANYBLOB=',func=MODULE_CHECK,uid>', @ANYRESDEC=0xee01, @ANYBLOB="2c736d2f72746330000c726f6f747e75636f6e746578743d7379736164b50e00006606006e65723d0000000000000000000000007b7a00000000000000000014000000", @ANYRESDEC=r2, @ANYBLOB=',audit,dont_measure,obj_type=/dev/rtc0\x00,\x00']) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:51 executing program 5: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 01:36:51 executing program 0: unshare(0x6c020200) unshare(0x20000400) prctl$PR_SET_TIMERSLACK(0x1d, 0x400) unshare(0x800) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) ptrace$setopts(0x4200, r1, 0x2000000000006a5, 0x4a) unshare(0x20000400) 01:36:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r2 = geteuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x802048, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdn\x00=', @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',access=', @ANYRESDEC, @ANYBLOB=',func=MODULE_CHECK,uid>', @ANYRESDEC=0xee01, @ANYBLOB="2c736d2f72746330000c726f6f747e75636f6e746578743d7379736164b50e00006606006e65723d0000000000000000000000007b7a00000000000000000014000000", @ANYRESDEC=r2, @ANYBLOB=',audit,dont_measure,obj_type=/dev/rtc0\x00,\x00']) 01:36:51 executing program 5: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x2, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, 0x0, 0x0, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x44008}, 0x12a91023f5ec0dc5) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000000)={0x30, 0x28, 0xd, 0x17, 0xb, 0x7fff, 0x2, 0x3c, 0xb55cbefe9f2a22d0}) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 0: unshare(0x6c020200) unshare(0x20000400) unshare(0x20000400) 01:36:51 executing program 5: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) ptrace$setopts(0x4200, r1, 0x2000000000006a5, 0x4a) 01:36:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) geteuid() 01:36:51 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x8) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x13a, 0xffffffffffffffff}}) 01:36:51 executing program 5: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:36:51 executing program 0: unshare(0x6c020200) socket$inet6_udp(0xa, 0x2, 0x0) 01:36:51 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) 01:36:51 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x1c91, 0x0, 0x0, 0xffffffffffffffff}}) 01:36:51 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:36:51 executing program 5: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)={0x40032, 0x806c, 0x80}) 01:36:52 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c, 0x0, 0x1c91}}) 01:36:52 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) gettid() 01:36:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r1 = geteuid() r2 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000200)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xe8) r4 = getpgid(0xffffffffffffffff) r5 = gettid() ptrace$pokeuser(0x6, r5, 0x0, 0x0) msgctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000300)={{0x2, r1, r2, r3, 0xffffffffffffffff, 0x117, 0x200}, 0x0, 0x0, 0x0, 0x3ae6, 0x8001, 0x2, 0x80, 0x9, 0x3ff, 0x3f, r4, r5}) syz_open_dev$rtc(&(0x7f0000000000), 0x6, 0xc0800) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e24, 0x3b06, 0x4e23, 0x0, 0xa, 0xa0, 0x0, 0x3c, 0x0, r1}, {0x6, 0x7698187a, 0x7, 0xfffffffffffffffd, 0x3, 0x9, 0x9, 0x6}, {0x1, 0x7, 0x3f}, 0xfff, 0x6e6bbe, 0x1, 0x0, 0x2, 0x3}, {{@in=@local, 0x4d5}, 0xa, @in=@multicast2, 0x0, 0x2, 0x1, 0x0, 0x401, 0x600, 0x20}}, 0xe8) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:52 executing program 0: keyctl$session_to_parent(0x12) unshare(0x6c020200) unshare(0x40000200) 01:36:52 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, 0x0) 01:36:52 executing program 3: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) 01:36:52 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0x4a, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r1, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @dev={0xac, 0x14, 0x14, 0x32}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x20040006}, 0x840) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x311401, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x10980, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) 01:36:52 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) unshare(0x6c020200) 01:36:52 executing program 3: unshare(0x6c020200) unshare(0x20000400) prctl$PR_SET_TIMERSLACK(0x1d, 0x400) unshare(0x800) 01:36:52 executing program 0: unshare(0x6c020200) unshare(0x20000400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) openat$cgroup_type(r0, &(0x7f0000000000), 0x2, 0x0) clock_getres(0x2, &(0x7f0000000080)) unshare(0x50000000) unshare(0x980) getrandom(&(0x7f0000000040)=""/60, 0x3c, 0x0) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x3, 0xffffffffd6083d63) getpgrp(r1) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, 0x0) 01:36:52 executing program 2: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="480000ed383cecf5283600", @ANYRES16=0x0, @ANYBLOB="000427bd7000fddbdf25060000000800030000000000080003000400000014000180060001000ca90000050002004000000008000200080000000800030002000000"], 0x48}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) io_setup(0x3, &(0x7f0000000180)=0x0) io_cancel(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x3ff, r0, &(0x7f00000001c0)="50438056fd8d8d6294b8224af85573dc5d3896f71d21f5d10c63b07ec48185491996408a8bfee016e5b12f31ba17f81c54e96ab09cfeffbebe16bd891bc783469e2c9f1317c2744cf53180708e54146483d47ab226f4de25cb8f62ce450991eda050e95f7174e0d3df2fd3df138723bc57999d329a323ad7abc697f9678e728230ebbe5de588105bf3dbff7eed9f2efb2a73cc0f47f6e81af3409f14de5208f3012d293c7c580ae6f760d155221faa4175d367f4f032df31d8493b80c9698d0da29078c96e57ccca886667697e47aa3941ce1346f4752e286eb9b41009312e915a33dc", 0xe3, 0x100000000, 0x0, 0x3}, &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast1, @in=@empty}}, {{@in6}}}, &(0x7f0000000040)=0xe8) 01:36:52 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, &(0x7f0000000000)) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, 0x0) 01:36:52 executing program 0: unshare(0x6c020200) unshare(0x20000400) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:36:52 executing program 3: keyctl$session_to_parent(0x12) unshare(0x6c020200) unshare(0x40000200) 01:36:52 executing program 2: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 1: wait4(0x0, 0x0, 0x20000002, &(0x7f0000000000)) 01:36:52 executing program 2: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 1: wait4(0x0, 0x0, 0x20000002, &(0x7f0000000000)) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x806c, 0x80}) 01:36:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:52 executing program 3: keyctl$session_to_parent(0x12) unshare(0x6c020200) unshare(0x40000200) 01:36:52 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 0: unshare(0x6c020200) unshare(0x42010000) unshare(0x20000400) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x80}) 01:36:52 executing program 1: wait4(0x0, 0x0, 0x20000002, &(0x7f0000000000)) [ 907.097356][T19378] rtc_cmos 00:00: Alarms can be up to one day in the future 01:36:52 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) [ 907.144475][T19378] rtc_cmos 00:00: Alarms can be up to one day in the future 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:52 executing program 1: getpgid(0x0) wait4(0x0, 0x0, 0x20000002, &(0x7f0000000000)) 01:36:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x521680, 0x0) 01:36:52 executing program 3: keyctl$session_to_parent(0x12) unshare(0x6c020200) unshare(0x40000200) 01:36:52 executing program 0: r0 = socket(0x11, 0x80000, 0x7) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10080281}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010100}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000080)={0x0, ""/153}, 0xa1, 0x1, 0x3000) unshare(0x6c020200) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000000)=@fragment={0x2c, 0x0, 0xe6, 0x1, 0x0, 0x3, 0x67}, 0x8) unshare(0x20000400) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={@mcast1, 0x75}) 01:36:52 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 1: getpgid(0x0) wait4(0x0, 0x0, 0x20000002, &(0x7f0000000000)) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) openat$cgroup_type(r1, &(0x7f0000000000), 0x2, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:52 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:52 executing program 3: keyctl$session_to_parent(0x12) unshare(0x40000200) 01:36:52 executing program 1: getpgid(0x0) wait4(0x0, 0x0, 0x20000002, &(0x7f0000000000)) 01:36:52 executing program 0: unshare(0x62010280) unshare(0x20000400) r0 = syz_open_dev$vcsn(&(0x7f0000000140), 0x1000, 0x105000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r1}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000200)={'ip6gre0\x00', &(0x7f0000000180)={'ip6gre0\x00', r1, 0x29, 0x80, 0x40, 0x41, 0x6, @mcast1, @local, 0x1, 0x8, 0x7, 0x10000}}) r2 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getsockopt$inet6_tcp_int(r2, 0x6, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 01:36:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:52 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:52 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x0, &(0x7f0000000000)) 01:36:52 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000100)=0x80, 0xc00) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0xf}, 0x1}}, {{0xa, 0x4e21, 0x8000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x5}}}, 0x108) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)={0xb, 0x28, 0x4, 0x1d, 0xb, 0x9, 0x3, 0x4f}) ioctl$RTC_UIE_ON(r1, 0x7003) 01:36:52 executing program 3: keyctl$session_to_parent(0x12) unshare(0x40000200) 01:36:52 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000240)) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:52 executing program 0: setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="8b050000000000000728000000010801000106000800000000000700000000000000b200"/56], 0x38) unshare(0x6c020200) unshare(0x20000400) 01:36:52 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x0, &(0x7f0000000000)) 01:36:52 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 01:36:52 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:52 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:52 executing program 0: unshare(0x6c020200) unshare(0x20000400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:53 executing program 3: keyctl$session_to_parent(0x12) unshare(0x40000200) 01:36:53 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x0, &(0x7f0000000000)) 01:36:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 01:36:53 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 1: r0 = getpgid(0x0) wait4(r0, 0x0, 0x20000002, 0x0) 01:36:53 executing program 3: unshare(0x6c020200) unshare(0x40000200) 01:36:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x200140, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), 0xffffffffffffffff) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:53 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 01:36:53 executing program 0: unshare(0x6c020200) unshare(0x20000400) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000000)=0x6) 01:36:53 executing program 1: setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="8b050000000000000728000000010801000106000800000000000700000000000000b200"/56], 0x38) unshare(0x6c020200) unshare(0x20000400) 01:36:53 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:53 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x8240, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:53 executing program 3: unshare(0x0) unshare(0x40000200) 01:36:53 executing program 5: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 0: unshare(0x6c020200) unshare(0x20000400) io_destroy(0x0) 01:36:53 executing program 1: unshare(0x6c020200) unshare(0x20000400) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000000)=0x6) [ 907.895281][T19586] rtc_cmos 00:00: Alarms can be up to one day in the future 01:36:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:53 executing program 5: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 3: unshare(0x0) unshare(0x40000200) 01:36:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x420a00, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000100), 0x401, 0x4000) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r3 = socket(0x5, 0x3, 0xe360) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0), r3) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r4}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@mcast1, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0xffffa26d, 0x20, 0x2, 0x400, 0x7, 0x80000000, r4}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) 01:36:53 executing program 0: unshare(0x6c020200) unshare(0x20000400) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x1, 0x4) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x2, 0x109180) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x4, 0xe689, 0x6, @empty, @private1, 0x7800, 0x7, 0x7fffffff, 0x6}}) 01:36:53 executing program 5: r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 3: unshare(0x0) unshare(0x40000200) [ 908.027821][T19614] rtc_cmos 00:00: Alarms can be up to one day in the future 01:36:53 executing program 5: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 1: unshare(0x0) unshare(0x40000200) 01:36:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:53 executing program 0: unshare(0x6c020200) unshare(0x20000400) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x4, &(0x7f0000000000)) 01:36:53 executing program 5: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 3: unshare(0x6c020200) unshare(0x0) 01:36:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) prctl$PR_SET_TSC(0x1a, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet6(r1, &(0x7f0000000980)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000009c0)=0x1c) process_vm_writev(0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/66, 0x42}, {&(0x7f0000000180)=""/149, 0x95}, {&(0x7f0000000240)=""/95, 0x5f}, {&(0x7f00000002c0)=""/116, 0x74}, {&(0x7f0000000340)=""/189, 0xbd}, {&(0x7f0000000400)=""/79, 0x4f}, {&(0x7f0000000080)=""/33, 0x21}, {&(0x7f0000000480)=""/62, 0x3e}, {&(0x7f00000004c0)=""/24, 0x18}], 0x9, &(0x7f0000000900)=[{&(0x7f00000005c0)=""/113, 0x71}, {&(0x7f0000000640)=""/236, 0xec}, {&(0x7f0000000740)=""/59, 0x3b}, {&(0x7f0000000780)=""/120, 0x78}, {&(0x7f0000000800)=""/67, 0x43}, {&(0x7f0000000880)=""/89, 0x59}], 0x6, 0x0) r2 = gettid() ptrace$pokeuser(0x6, r2, 0x0, 0x0) ptrace$getenv(0x4201, r2, 0x9, &(0x7f0000000040)) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) 01:36:53 executing program 1: unshare(0x6c020200) unshare(0x20000400) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000)=0x1, 0x4) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x2, 0x109180) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'syztnl1\x00', &(0x7f0000000080)={'ip6_vti0\x00', 0x0, 0x4, 0x1, 0x4, 0xe689, 0x6, @empty, @private1, 0x7800, 0x7, 0x7fffffff, 0x6}}) 01:36:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) [ 908.193578][T19664] rtc_cmos 00:00: Alarms can be up to one day in the future 01:36:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:53 executing program 5: getpid() r0 = gettid() rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 0: unshare(0x6c020200) unshare(0x20000400) unshare(0x30030300) 01:36:53 executing program 3: unshare(0x6c020200) unshare(0x0) 01:36:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:53 executing program 5: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 1: unshare(0x6c020200) unshare(0x0) [ 908.309028][T19693] rtc_cmos 00:00: Alarms can be up to one day in the future 01:36:53 executing program 2: ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:53 executing program 5: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 2: ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:53 executing program 3: unshare(0x6c020200) unshare(0x0) 01:36:53 executing program 1: unshare(0x6c020200) unshare(0x0) 01:36:53 executing program 0: unshare(0x7c060200) unshare(0x42008180) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x88, 0x0, 0x180, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x20, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x88}, 0x1, 0x0, 0x0, 0x9040}, 0x4004000) unshare(0x0) 01:36:53 executing program 5: r0 = getpid() gettid() rt_tgsigqueueinfo(r0, 0x0, 0x0, &(0x7f0000000280)) 01:36:53 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x68100, 0x0) ioctl$RTC_AIE_OFF(r1, 0x7002) 01:36:53 executing program 2: ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:53 executing program 0: msgsnd(0xffffffffffffffff, &(0x7f0000000000)={0x0, "2e2f9808a4dcd77feeae8613b858dbbc1f9b03c0b38d0069cb9d2f96f2eec60716204cc8bcb8be1a99f603843e74ec3f1728d8f2cb8e71a16d68e357b6327abba93a2460f7d528229db87aaf55032850ffc1ac4770b00dc6cfb6b899a2a9183a8d1a79ea52444568154a3b8d2911ef5be383bd31fbf0c832ef"}, 0x81, 0x0) r0 = msgget(0x2, 0x400) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000000c0)=""/115) unshare(0x6c020200) unshare(0x20000400) 01:36:53 executing program 1: unshare(0x6c020200) unshare(0x20000400) io_destroy(0x0) 01:36:53 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, 0x0) 01:36:53 executing program 3: unshare(0x2c020400) r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x10, 0x1, 0x1c, 0x4, 0x1c91, 0x4, 0x13a, 0xffffffffffffffff}}) 01:36:53 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:53 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="440000800371d7ed"], 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x811) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) 01:36:54 executing program 0: unshare(0x6c020200) sendmsg$MPTCP_PM_CMD_DEL_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10000}, 0x4000014) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x48, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffff7}]}, 0x48}, 0x1, 0x0, 0x0, 0x81}, 0x2000000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000140)={@empty, 0x0}, &(0x7f0000000180)=0x14) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, 0x0, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @empty}}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4) unshare(0x20000400) 01:36:54 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, 0x0) 01:36:54 executing program 3: msgsnd(0xffffffffffffffff, &(0x7f0000000000)={0x0, "2e2f9808a4dcd77feeae8613b858dbbc1f9b03c0b38d0069cb9d2f96f2eec60716204cc8bcb8be1a99f603843e74ec3f1728d8f2cb8e71a16d68e357b6327abba93a2460f7d528229db87aaf55032850ffc1ac4770b00dc6cfb6b899a2a9183a8d1a79ea52444568154a3b8d2911ef5be383bd31fbf0c832ef"}, 0x81, 0x0) r0 = msgget(0x2, 0x400) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000000c0)=""/115) unshare(0x6c020200) unshare(0x20000400) 01:36:54 executing program 1: unshare(0x6c020200) unshare(0x20000400) io_destroy(0x0) 01:36:54 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:54 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, 0x0) 01:36:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000100)) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) 01:36:54 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:36:54 executing program 0: getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, &(0x7f00000000c0)=0x1c) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0x1c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000180)={{0xa, 0x4e24, 0xffff, @private2={0xfc, 0x2, '\x00', 0x1}, 0xa7}, {0xa, 0x4e22, 0x6, @remote, 0xe58}, 0xfeff, [0x4, 0x2, 0x3, 0x8, 0x1, 0x2b5, 0xfffffff7, 0x4]}, 0x5c) unshare(0x6c020200) unshare(0x20000400) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x6, 0x0, 0x1, 0x5, 0x992b, 0x2}, &(0x7f0000000040)=0x20) unshare(0x30000) 01:36:54 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="440000800371d7ed"], 0x14}}, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x811) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) 01:36:54 executing program 5 (fault-call:2 fault-nth:0): r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:54 executing program 3 (fault-call:1 fault-nth:0): unshare(0x6c020200) unshare(0x40000200) [ 908.825077][T19830] FAULT_INJECTION: forcing a failure. [ 908.825077][T19830] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 908.838437][T19830] CPU: 0 PID: 19830 Comm: syz-executor.5 Not tainted 5.13.0-rc5-syzkaller #0 [ 908.847417][T19830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 908.857499][T19830] Call Trace: [ 908.860784][T19830] dump_stack+0x137/0x19d [ 908.865560][T19830] should_fail+0x23c/0x250 [ 908.869983][T19830] should_fail_usercopy+0x16/0x20 01:36:54 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:36:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x4824c0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) [ 908.875056][T19830] _copy_from_user+0x1c/0xd0 [ 908.879671][T19830] __se_sys_rt_tgsigqueueinfo+0x4c/0x390 [ 908.885396][T19830] ? __fget_light+0x21b/0x260 [ 908.890221][T19830] ? __cond_resched+0x11/0x40 [ 908.895076][T19830] ? fput+0x2d/0x130 [ 908.899043][T19830] ? ksys_write+0x157/0x180 [ 908.904103][T19830] __x64_sys_rt_tgsigqueueinfo+0x51/0x60 [ 908.909742][T19830] do_syscall_64+0x4a/0x90 [ 908.914160][T19830] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 908.920133][T19830] RIP: 0033:0x4665d9 01:36:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) [ 908.924216][T19830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 908.943881][T19830] RSP: 002b:00007f8b3b6b6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000129 [ 908.952719][T19830] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 908.960689][T19830] RDX: 0000000000000000 RSI: 0000000000003c23 RDI: 0000000000003c22 [ 908.968729][T19830] RBP: 00007f8b3b6b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 908.976709][T19830] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000001 [ 908.984683][T19830] R13: 00007ffcf8d8deff R14: 00007f8b3b6b6300 R15: 0000000000022000 [ 909.009110][T19850] FAULT_INJECTION: forcing a failure. [ 909.009110][T19850] name failslab, interval 1, probability 0, space 0, times 0 [ 909.020383][T19851] FAULT_INJECTION: forcing a failure. [ 909.020383][T19851] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.022602][T19850] CPU: 1 PID: 19850 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 909.044329][T19850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.054485][T19850] Call Trace: [ 909.057793][T19850] dump_stack+0x137/0x19d [ 909.062129][T19850] should_fail+0x23c/0x250 [ 909.066570][T19850] ? copy_fs_struct+0x2e/0x130 [ 909.071336][T19850] __should_failslab+0x81/0x90 [ 909.076111][T19850] should_failslab+0x5/0x20 [ 909.080616][T19850] kmem_cache_alloc+0x46/0x2f0 [ 909.085455][T19850] copy_fs_struct+0x2e/0x130 [ 909.090608][T19850] ksys_unshare+0x26f/0x710 [ 909.095115][T19850] ? ksys_write+0x157/0x180 [ 909.099748][T19850] __x64_sys_unshare+0x1b/0x20 [ 909.104703][T19850] do_syscall_64+0x4a/0x90 [ 909.109122][T19850] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 909.115045][T19850] RIP: 0033:0x4665d9 [ 909.119007][T19850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.138693][T19850] RSP: 002b:00007f2bd7c2b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 909.147094][T19850] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 909.155054][T19850] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 909.163026][T19850] RBP: 00007f2bd7c2b1d0 R08: 0000000000000000 R09: 0000000000000000 01:36:54 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:54 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x1430c0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) ioctl$RTC_UIE_ON(r0, 0x7003) [ 909.171108][T19850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 909.179159][T19850] R13: 00007ffeeed9066f R14: 00007f2bd7c2b300 R15: 0000000000022000 [ 909.187137][T19851] CPU: 0 PID: 19851 Comm: syz-executor.1 Not tainted 5.13.0-rc5-syzkaller #0 [ 909.195974][T19851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.206318][T19851] Call Trace: [ 909.209602][T19851] dump_stack+0x137/0x19d [ 909.214110][T19851] should_fail+0x23c/0x250 [ 909.218536][T19851] should_fail_usercopy+0x16/0x20 01:36:54 executing program 0: unshare(0x6c020200) unshare(0x20000400) getrandom(&(0x7f0000000000)=""/172, 0xac, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, {0xa, 0x4e21, 0x1, @rand_addr=' \x01\x00', 0x5}, 0x3, [0x800, 0x5, 0x3, 0xcdf7, 0x1, 0xfffffff8, 0x89a, 0x7]}, 0x5c) [ 909.223660][T19851] _copy_to_user+0x1c/0x90 [ 909.228113][T19851] rtc_dev_ioctl+0x240/0x670 [ 909.232898][T19851] ? rtc_dev_poll+0xa0/0xa0 [ 909.237416][T19851] __se_sys_ioctl+0xcb/0x140 [ 909.237438][T19851] __x64_sys_ioctl+0x3f/0x50 [ 909.237454][T19851] do_syscall_64+0x4a/0x90 [ 909.237471][T19851] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 909.257341][T19851] RIP: 0033:0x4665d9 01:36:54 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 01:36:54 executing program 0: unshare(0x6c020200) unshare(0x28010000) unshare(0x200) unshare(0x20000400) r0 = socket$inet6(0xa, 0x1, 0xffffff22) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00', 0x0, [0x0, 0x7a, 0x0, 0x5, 0x5]}, &(0x7f0000000080)=0x54) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x3b, &(0x7f00000000c0)={0x2f, 0x3, '\x00', [@jumbo={0xc2, 0x4, 0x7}, @generic={0x7f, 0x9, "6f2947f4f9e2bb5426"}, @ra={0x5, 0x2, 0x9}, @ra={0x5, 0x2, 0xfff}]}, 0x28) 01:36:54 executing program 1 (fault-call:1 fault-nth:1): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) [ 909.257358][T19851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:36:54 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) [ 909.257372][T19851] RSP: 002b:00007ff2588a6188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 909.257387][T19851] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:36:54 executing program 5 (fault-call:2 fault-nth:1): r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:54 executing program 3 (fault-call:1 fault-nth:1): unshare(0x6c020200) unshare(0x40000200) 01:36:54 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000100)) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) 01:36:54 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) [ 909.257396][T19851] RDX: 0000000020000240 RSI: 0000000080247009 RDI: 0000000000000003 01:36:54 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:54 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x2, &(0x7f0000000240)) [ 909.257408][T19851] RBP: 00007ff2588a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 909.257459][T19851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 909.257468][T19851] R13: 00007ffe7a88e78f R14: 00007ff2588a6300 R15: 0000000000022000 [ 909.372230][T19883] FAULT_INJECTION: forcing a failure. [ 909.372230][T19883] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.372253][T19883] CPU: 0 PID: 19883 Comm: syz-executor.1 Not tainted 5.13.0-rc5-syzkaller #0 [ 909.372270][T19883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.372279][T19883] Call Trace: [ 909.372286][T19883] dump_stack+0x137/0x19d [ 909.372309][T19883] should_fail+0x23c/0x250 [ 909.372365][T19883] should_fail_usercopy+0x16/0x20 [ 909.372383][T19883] _copy_to_user+0x1c/0x90 [ 909.372402][T19883] simple_read_from_buffer+0xab/0x120 [ 909.372424][T19883] proc_fail_nth_read+0xf6/0x140 [ 909.372462][T19883] ? rw_verify_area+0x136/0x250 [ 909.372515][T19883] ? proc_fault_inject_write+0x200/0x200 [ 909.372533][T19883] vfs_read+0x154/0x5d0 [ 909.372553][T19883] ? __fget_light+0x21b/0x260 [ 909.372577][T19883] ? __cond_resched+0x11/0x40 [ 909.372609][T19883] ksys_read+0xce/0x180 [ 909.372624][T19883] __x64_sys_read+0x3e/0x50 [ 909.372641][T19883] do_syscall_64+0x4a/0x90 [ 909.372660][T19883] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 909.372760][T19883] RIP: 0033:0x41935c [ 909.372773][T19883] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 909.372864][T19883] RSP: 002b:00007ff2588a6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 909.372884][T19883] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041935c [ 909.372898][T19883] RDX: 000000000000000f RSI: 00007ff2588a61e0 RDI: 0000000000000004 [ 909.372910][T19883] RBP: 00007ff2588a61d0 R08: 0000000000000000 R09: 0000000000000000 [ 909.372922][T19883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 909.372934][T19883] R13: 00007ffe7a88e78f R14: 00007ff2588a6300 R15: 0000000000022000 [ 909.471993][T19896] FAULT_INJECTION: forcing a failure. [ 909.471993][T19896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.472085][T19896] CPU: 0 PID: 19896 Comm: syz-executor.5 Not tainted 5.13.0-rc5-syzkaller #0 [ 909.472101][T19896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.472109][T19896] Call Trace: [ 909.472115][T19896] dump_stack+0x137/0x19d [ 909.472141][T19896] should_fail+0x23c/0x250 [ 909.472161][T19896] should_fail_usercopy+0x16/0x20 [ 909.472181][T19896] _copy_to_user+0x1c/0x90 [ 909.472270][T19896] simple_read_from_buffer+0xab/0x120 [ 909.472296][T19896] proc_fail_nth_read+0xf6/0x140 [ 909.472315][T19896] ? rw_verify_area+0x136/0x250 [ 909.472338][T19896] ? proc_fault_inject_write+0x200/0x200 [ 909.472437][T19896] vfs_read+0x154/0x5d0 [ 909.472457][T19896] ? __se_sys_rt_tgsigqueueinfo+0x1f0/0x390 [ 909.472480][T19896] ? __fget_light+0x21b/0x260 [ 909.472498][T19896] ? __cond_resched+0x11/0x40 [ 909.472514][T19896] ksys_read+0xce/0x180 [ 909.472555][T19896] __x64_sys_read+0x3e/0x50 [ 909.472579][T19896] do_syscall_64+0x4a/0x90 [ 909.472599][T19896] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 909.472620][T19896] RIP: 0033:0x41935c [ 909.472632][T19896] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 909.472646][T19896] RSP: 002b:00007f8b3b6b6170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 909.472663][T19896] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041935c [ 909.472677][T19896] RDX: 000000000000000f RSI: 00007f8b3b6b61e0 RDI: 0000000000000003 [ 909.472714][T19896] RBP: 00007f8b3b6b61d0 R08: 0000000000000000 R09: 0000000000000000 [ 909.472723][T19896] R10: 0000000020000280 R11: 0000000000000246 R12: 0000000000000001 [ 909.472733][T19896] R13: 00007ffcf8d8deff R14: 00007f8b3b6b6300 R15: 0000000000022000 [ 909.512490][T19903] FAULT_INJECTION: forcing a failure. [ 909.512490][T19903] name failslab, interval 1, probability 0, space 0, times 0 [ 909.512513][T19903] CPU: 0 PID: 19903 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 909.512533][T19903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 909.512543][T19903] Call Trace: [ 909.512551][T19903] dump_stack+0x137/0x19d [ 909.512662][T19903] should_fail+0x23c/0x250 [ 909.512676][T19903] ? kzalloc+0x16/0x20 [ 909.512806][T19903] __should_failslab+0x81/0x90 [ 909.512828][T19903] should_failslab+0x5/0x20 [ 909.512844][T19903] __kmalloc+0x66/0x340 [ 909.512862][T19903] kzalloc+0x16/0x20 [ 909.512961][T19903] copy_net_ns+0xda/0x450 [ 909.512980][T19903] ? copy_cgroup_ns+0x7a/0x3a0 [ 909.513004][T19903] create_new_namespaces+0x231/0x560 [ 909.513108][T19903] unshare_nsproxy_namespaces+0xe2/0x120 [ 909.513128][T19903] ksys_unshare+0x381/0x710 [ 909.513143][T19903] __x64_sys_unshare+0x1b/0x20 [ 909.513156][T19903] do_syscall_64+0x4a/0x90 [ 909.513231][T19903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 909.513249][T19903] RIP: 0033:0x4665d9 [ 909.513260][T19903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 909.513273][T19903] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 909.513291][T19903] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 909.513379][T19903] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 01:36:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x36, 0x29, 0xb, 0xb, 0xb, 0x0, 0x6, 0x4b, 0xffffffffffffffff}}) 01:36:55 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000100)) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) 01:36:55 executing program 3 (fault-call:1 fault-nth:2): unshare(0x6c020200) unshare(0x40000200) [ 909.513388][T19903] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 909.513397][T19903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 909.513405][T19903] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:36:55 executing program 0: unshare(0x6c020200) unshare(0x40000000) unshare(0x50600) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000000)) unshare(0x20000400) 01:36:55 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x4b47, &(0x7f0000000240)) 01:36:55 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:36:55 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in=@private, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) [ 910.163529][T19925] FAULT_INJECTION: forcing a failure. [ 910.163529][T19925] name failslab, interval 1, probability 0, space 0, times 0 [ 910.176727][T19925] CPU: 0 PID: 19925 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 910.185588][T19925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.196387][T19925] Call Trace: [ 910.199845][T19925] dump_stack+0x137/0x19d [ 910.204321][T19925] should_fail+0x23c/0x250 [ 910.208993][T19925] ? copy_net_ns+0x121/0x450 01:36:55 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000100)) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000140)) [ 910.213798][T19925] __should_failslab+0x81/0x90 [ 910.218590][T19925] should_failslab+0x5/0x20 [ 910.223225][T19925] kmem_cache_alloc+0x46/0x2f0 [ 910.228119][T19925] copy_net_ns+0x121/0x450 [ 910.232599][T19925] ? copy_cgroup_ns+0x7a/0x3a0 [ 910.237579][T19925] create_new_namespaces+0x231/0x560 [ 910.242875][T19925] unshare_nsproxy_namespaces+0xe2/0x120 [ 910.248610][T19925] ksys_unshare+0x381/0x710 [ 910.253225][T19925] __x64_sys_unshare+0x1b/0x20 [ 910.258041][T19925] do_syscall_64+0x4a/0x90 01:36:55 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) [ 910.262688][T19925] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 910.269159][T19925] RIP: 0033:0x4665d9 [ 910.273153][T19925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 910.294638][T19925] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 910.304397][T19925] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:36:55 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x4b49, &(0x7f0000000240)) 01:36:55 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x9, &(0x7f0000000280)) [ 910.312916][T19925] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 910.320976][T19925] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 910.328951][T19925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 910.337075][T19925] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:36:55 executing program 0: unshare(0x6c020200) unshare(0x10000) 01:36:55 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x541b, &(0x7f0000000240)) 01:36:55 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000100)) 01:36:55 executing program 3 (fault-call:1 fault-nth:3): unshare(0x6c020200) unshare(0x40000200) 01:36:55 executing program 4: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x2f, 0x5, 0x0, 0x0, 0x0, @loopback, @private2, 0x20, 0x40, 0x3, 0x7ff}}) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x74, 0x0, 0x2, 0x70bd2b, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x48, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xfc}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xb8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x6}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x40008080}, 0x10) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = syz_open_dev$rtc(&(0x7f0000000000), 0x100000000, 0x2c4800) ioctl$RTC_WIE_OFF(r2, 0x7010) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xfff, 0x8000) syz_open_dev$rtc(&(0x7f0000000080), 0x1000, 0x70dc40) ioctl$RTC_UIE_ON(r3, 0x7003) 01:36:55 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x11, &(0x7f0000000280)) 01:36:55 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) 01:36:55 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x5421, &(0x7f0000000240)) 01:36:55 executing program 0: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x2, 0xee00, 0xee01, 0xffffffffffffffff, 0x0, 0x2c, 0x1a}, 0x0, 0x0, 0x5, 0x81e, 0x4, 0x8000, 0x1f, 0x20, 0x8, 0x5, 0xffffffffffffffff, 0xffffffffffffffff}) unshare(0x6c020200) unshare(0x20000400) 01:36:55 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) ioctl$RTC_AIE_OFF(r1, 0x7002) 01:36:55 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x5450, &(0x7f0000000240)) 01:36:55 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x13, &(0x7f0000000280)) [ 910.537392][T19997] FAULT_INJECTION: forcing a failure. [ 910.537392][T19997] name failslab, interval 1, probability 0, space 0, times 0 [ 910.550441][T19997] CPU: 1 PID: 19997 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 910.559214][T19997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.569293][T19997] Call Trace: [ 910.572585][T19997] dump_stack+0x137/0x19d [ 910.577093][T19997] should_fail+0x23c/0x250 [ 910.581553][T19997] __should_failslab+0x81/0x90 01:36:55 executing program 0: unshare(0x6c020200) unshare(0x20000400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x224801, 0x0) ioctl$RTC_VL_CLR(r0, 0x7014) unshare(0x4040080) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x88240, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000100)) io_setup(0x6, &(0x7f0000000c80)=0x0) io_getevents(r2, 0x10000, 0x0, 0x0, 0x0) inotify_init1(0x0) ioctl$RTC_AIE_ON(r1, 0x7001) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x0) io_pgetevents(r2, 0x7, 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)={0x77359400}, 0x0) unshare(0x74020400) [ 910.586336][T19997] ? copy_net_ns+0x14f/0x450 [ 910.586365][T19997] should_failslab+0x5/0x20 [ 910.586382][T19997] kmem_cache_alloc_trace+0x49/0x310 [ 910.586459][T19997] ? kmem_cache_alloc+0x201/0x2f0 01:36:56 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x5451, &(0x7f0000000240)) [ 910.586485][T19997] ? copy_net_ns+0x121/0x450 [ 910.586500][T19997] copy_net_ns+0x14f/0x450 [ 910.586515][T19997] ? copy_cgroup_ns+0x7a/0x3a0 [ 910.586556][T19997] create_new_namespaces+0x231/0x560 [ 910.586576][T19997] unshare_nsproxy_namespaces+0xe2/0x120 01:36:56 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x5452, &(0x7f0000000240)) 01:36:56 executing program 3 (fault-call:1 fault-nth:4): unshare(0x6c020200) unshare(0x40000200) [ 910.586598][T19997] ksys_unshare+0x381/0x710 [ 910.586616][T19997] __x64_sys_unshare+0x1b/0x20 [ 910.586703][T19997] do_syscall_64+0x4a/0x90 [ 910.586725][T19997] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 910.586744][T19997] RIP: 0033:0x4665d9 [ 910.586756][T19997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 910.586773][T19997] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 910.586792][T19997] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 910.586805][T19997] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 910.586818][T19997] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 910.586863][T19997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 910.586872][T19997] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 910.646699][T20027] rtc_cmos 00:00: Alarms can be up to one day in the future [ 910.789454][T20047] FAULT_INJECTION: forcing a failure. [ 910.789454][T20047] name failslab, interval 1, probability 0, space 0, times 0 [ 910.789473][T20047] CPU: 1 PID: 20047 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 910.789490][T20047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 910.789500][T20047] Call Trace: [ 910.789506][T20047] dump_stack+0x137/0x19d [ 910.789526][T20047] should_fail+0x23c/0x250 [ 910.789543][T20047] ? proc_net_ns_init+0x2b/0x1d0 [ 910.789561][T20047] __should_failslab+0x81/0x90 [ 910.789658][T20047] should_failslab+0x5/0x20 [ 910.789673][T20047] kmem_cache_alloc+0x46/0x2f0 [ 910.789693][T20047] proc_net_ns_init+0x2b/0x1d0 [ 910.789711][T20047] ops_init+0x1e7/0x230 [ 910.789768][T20047] ? setup_net+0x79/0x700 [ 910.789782][T20047] setup_net+0x1cb/0x700 [ 910.789798][T20047] copy_net_ns+0x2a9/0x450 [ 910.789818][T20047] create_new_namespaces+0x231/0x560 [ 910.789841][T20047] unshare_nsproxy_namespaces+0xe2/0x120 [ 910.789914][T20047] ksys_unshare+0x381/0x710 [ 910.789926][T20047] __x64_sys_unshare+0x1b/0x20 [ 910.789939][T20047] do_syscall_64+0x4a/0x90 [ 910.789959][T20047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 910.789994][T20047] RIP: 0033:0x4665d9 [ 910.790042][T20047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 910.790060][T20047] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 910.790079][T20047] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 910.790089][T20047] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 910.790098][T20047] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 910.790106][T20047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 910.790115][T20047] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:36:56 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), r0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1218}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x40010) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0xa6) 01:36:56 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) ioctl$RTC_AIE_OFF(r1, 0x7002) 01:36:56 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x5460, &(0x7f0000000240)) 01:36:56 executing program 3 (fault-call:1 fault-nth:5): unshare(0x6c020200) unshare(0x40000200) [ 911.056502][T20004] rtc_cmos 00:00: Alarms can be up to one day in the future [ 911.094613][T20057] rtc_cmos 00:00: Alarms can be up to one day in the future 01:36:56 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:36:56 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7001, &(0x7f0000000240)) 01:36:56 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0xc00c0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_OFF(r0, 0x7004) [ 911.116108][T20063] FAULT_INJECTION: forcing a failure. [ 911.116108][T20063] name failslab, interval 1, probability 0, space 0, times 0 [ 911.128793][T20063] CPU: 0 PID: 20063 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 911.137717][T20063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 911.148446][T20063] Call Trace: [ 911.151778][T20063] dump_stack+0x137/0x19d [ 911.156646][T20063] should_fail+0x23c/0x250 [ 911.165178][T20063] ? __proc_create+0x3c1/0x680 [ 911.169975][T20063] __should_failslab+0x81/0x90 [ 911.174754][T20063] should_failslab+0x5/0x20 [ 911.179293][T20063] kmem_cache_alloc+0x46/0x2f0 [ 911.184236][T20063] ? chacha_block_generic+0x25a/0x280 [ 911.189658][T20063] __proc_create+0x3c1/0x680 [ 911.194373][T20063] _proc_mkdir+0x5c/0xf0 [ 911.198760][T20063] proc_net_ns_init+0x17b/0x1d0 [ 911.203885][T20063] ops_init+0x1e7/0x230 [ 911.205016][T20073] rtc_cmos 00:00: Alarms can be up to one day in the future [ 911.208135][T20063] ? setup_net+0x79/0x700 [ 911.208158][T20063] setup_net+0x1cb/0x700 [ 911.224011][T20063] copy_net_ns+0x2a9/0x450 [ 911.228446][T20063] create_new_namespaces+0x231/0x560 [ 911.233848][T20063] unshare_nsproxy_namespaces+0xe2/0x120 [ 911.239503][T20063] ksys_unshare+0x381/0x710 [ 911.244054][T20063] __x64_sys_unshare+0x1b/0x20 [ 911.248883][T20063] do_syscall_64+0x4a/0x90 [ 911.253358][T20063] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 911.259463][T20063] RIP: 0033:0x4665d9 [ 911.263367][T20063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 911.282984][T20063] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 911.291400][T20063] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 911.299533][T20063] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 911.307508][T20063] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 911.315487][T20063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 911.323729][T20063] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 911.619181][T18123] rtc_cmos 00:00: Alarms can be up to one day in the future [ 911.626746][T18123] rtc_cmos 00:00: Alarms can be up to one day in the future [ 911.634384][T18123] rtc_cmos 00:00: Alarms can be up to one day in the future [ 911.642032][T18123] rtc_cmos 00:00: Alarms can be up to one day in the future [ 911.649321][T18123] rtc rtc0: __rtc_set_alarm: err=-22 01:36:58 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x900, &(0x7f0000000280)) 01:36:58 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x240, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) getpeername$inet6(r1, &(0x7f0000000080), &(0x7f0000000100)=0x1c) 01:36:58 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) 01:36:58 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7002, &(0x7f0000000240)) 01:36:58 executing program 0: unshare(0x6c020200) r0 = getpgrp(0xffffffffffffffff) getpgrp(r0) unshare(0x20000400) clock_getres(0x6, &(0x7f0000000000)) 01:36:58 executing program 3 (fault-call:1 fault-nth:6): unshare(0x6c020200) unshare(0x40000200) [ 913.665987][T20098] FAULT_INJECTION: forcing a failure. [ 913.665987][T20098] name failslab, interval 1, probability 0, space 0, times 0 [ 913.678674][T20098] CPU: 1 PID: 20098 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 913.687503][T20098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 913.697565][T20098] Call Trace: [ 913.700880][T20098] dump_stack+0x137/0x19d [ 913.705225][T20098] should_fail+0x23c/0x250 [ 913.709789][T20098] ? __proc_create+0x3c1/0x680 [ 913.714578][T20098] __should_failslab+0x81/0x90 [ 913.719403][T20098] should_failslab+0x5/0x20 [ 913.724036][T20098] kmem_cache_alloc+0x46/0x2f0 [ 913.729053][T20098] __proc_create+0x3c1/0x680 [ 913.733723][T20098] _proc_mkdir+0x5c/0xf0 [ 913.738001][T20098] netfilter_net_init+0x128/0x180 [ 913.743138][T20098] ops_init+0x1e7/0x230 [ 913.747382][T20098] ? setup_net+0x79/0x700 [ 913.751775][T20098] setup_net+0x1cb/0x700 [ 913.756032][T20098] copy_net_ns+0x2a9/0x450 [ 913.760459][T20098] create_new_namespaces+0x231/0x560 01:36:59 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x1100, &(0x7f0000000280)) 01:36:59 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) 01:36:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7003, &(0x7f0000000240)) 01:36:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/mdio_bus', 0x400000, 0xd0) ioctl$RTC_UIE_OFF(r1, 0x7004) syz_open_dev$rtc(&(0x7f0000000040), 0x80000000, 0x400001) accept$inet6(r1, 0x0, &(0x7f0000000140)) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f00000001c0)=0x9) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x22000, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x208883, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000180)) 01:36:59 executing program 0: unshare(0x6c020200) unshare(0x20010400) [ 913.766050][T20098] unshare_nsproxy_namespaces+0xe2/0x120 [ 913.771774][T20098] ksys_unshare+0x381/0x710 [ 913.776470][T20098] __x64_sys_unshare+0x1b/0x20 [ 913.781250][T20098] do_syscall_64+0x4a/0x90 [ 913.781273][T20098] entry_SYSCALL_64_after_hwframe+0x44/0xae 01:36:59 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x1300, &(0x7f0000000280)) 01:36:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7004, &(0x7f0000000240)) [ 913.781297][T20098] RIP: 0033:0x4665d9 01:36:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7005, &(0x7f0000000240)) 01:36:59 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) 01:36:59 executing program 0: r0 = gettid() ptrace$setopts(0x4200, r0, 0x5, 0x0) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) getpgrp(r1) unshare(0x64010380) getitimer(0x1, &(0x7f0000000000)) [ 913.781310][T20098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:36:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x7006, &(0x7f0000000240)) [ 913.781326][T20098] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 913.781340][T20098] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 913.781350][T20098] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 01:36:59 executing program 3 (fault-call:1 fault-nth:7): unshare(0x6c020200) unshare(0x40000200) 01:36:59 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x4000, &(0x7f0000000280)) 01:36:59 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:36:59 executing program 0: getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)={'mangle\x00', 0x0, [0xff, 0x81, 0xfffffff8, 0x1f, 0xffffff80]}, &(0x7f0000000080)=0x54) unshare(0x6c020200) [ 913.781361][T20098] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 913.781393][T20098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 913.781410][T20098] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 913.781477][T20098] cannot create netfilter proc entry [ 914.039684][T20172] FAULT_INJECTION: forcing a failure. [ 914.039684][T20172] name failslab, interval 1, probability 0, space 0, times 0 [ 914.060334][T20172] CPU: 0 PID: 20172 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 914.069219][T20172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.079464][T20172] Call Trace: [ 914.083130][T20172] dump_stack+0x137/0x19d [ 914.087677][T20172] should_fail+0x23c/0x250 [ 914.092185][T20172] ? __proc_create+0x3c1/0x680 [ 914.097241][T20172] __should_failslab+0x81/0x90 [ 914.102295][T20172] should_failslab+0x5/0x20 [ 914.107007][T20172] kmem_cache_alloc+0x46/0x2f0 [ 914.112097][T20172] ? ida_alloc_range+0x679/0x6a0 [ 914.117318][T20172] __proc_create+0x3c1/0x680 [ 914.122012][T20172] ? rb_insert_color+0x7e/0x310 [ 914.127363][T20172] proc_create_reg+0x89/0xe0 [ 914.132193][T20172] proc_create_net_data+0x58/0xf0 01:36:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000040), 0xf38, 0x80882) ioctl$RTC_UIE_ON(r3, 0x7003) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200), r1) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x104000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0xd0, r4, 0x18a572c6a9b79366, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x60, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x200}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffff8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e21}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0xc040}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x40}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8000}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x401}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4a18ba6b}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2b85}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}]}, 0xd0}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2c00ed7b", @ANYRES16=0x0, @ANYBLOB="02002dbd7000fddbdf2501000000080003000700000008000300050000000800020005000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4004000}, 0x80) ioctl$RTC_WIE_ON(r0, 0x700f) 01:36:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x40049409, &(0x7f0000000240)) 01:36:59 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x1000000, &(0x7f0000000280)) 01:36:59 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:36:59 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:36:59 executing program 0: getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) unshare(0x6c020200) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f00000000c0)={0xa1, 0x7, '\x00', [@ra={0x5, 0x2, 0x5}, @ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x30, {0x0, 0xa, 0x2f, 0x7, [0xc86, 0x2, 0x5, 0x7, 0xfff]}}, @ra={0x5, 0x2, 0x20}]}, 0x48) unshare(0x20000400) [ 914.137285][T20172] nf_log_net_init+0x48/0x320 [ 914.137321][T20172] ops_init+0x1e7/0x230 [ 914.146178][T20172] ? setup_net+0x79/0x700 [ 914.146247][T20172] setup_net+0x1cb/0x700 [ 914.146268][T20172] copy_net_ns+0x2a9/0x450 01:36:59 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x9000000, &(0x7f0000000280)) 01:36:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x40086602, &(0x7f0000000240)) [ 914.146289][T20172] create_new_namespaces+0x231/0x560 [ 914.146308][T20172] unshare_nsproxy_namespaces+0xe2/0x120 [ 914.146326][T20172] ksys_unshare+0x381/0x710 [ 914.146366][T20172] __x64_sys_unshare+0x1b/0x20 [ 914.146382][T20172] do_syscall_64+0x4a/0x90 [ 914.146401][T20172] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 914.146422][T20172] RIP: 0033:0x4665d9 [ 914.146434][T20172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.146447][T20172] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 01:36:59 executing program 3 (fault-call:1 fault-nth:8): unshare(0x6c020200) unshare(0x40000200) 01:36:59 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:36:59 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x11000000, &(0x7f0000000280)) 01:36:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x4008700c, &(0x7f0000000240)) [ 914.146462][T20172] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 914.146473][T20172] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 914.146483][T20172] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.146545][T20172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.146556][T20172] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:36:59 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x430042, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:36:59 executing program 0: unshare(0x0) unshare(0x20000400) 01:36:59 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x4008700e, &(0x7f0000000240)) 01:36:59 executing program 2: ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:36:59 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x13000000, &(0x7f0000000280)) [ 914.439142][T20234] FAULT_INJECTION: forcing a failure. [ 914.439142][T20234] name failslab, interval 1, probability 0, space 0, times 0 [ 914.452293][T20234] CPU: 0 PID: 20234 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 914.461228][T20234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.471300][T20234] Call Trace: [ 914.474585][T20234] dump_stack+0x137/0x19d [ 914.478991][T20234] should_fail+0x23c/0x250 [ 914.483548][T20234] ? nf_log_net_init+0x6f/0x320 01:36:59 executing program 2: ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:36:59 executing program 0: unshare(0x6c020200) unshare(0x8000000) unshare(0x2040080) unshare(0x5b040480) [ 914.488419][T20234] __should_failslab+0x81/0x90 [ 914.493230][T20234] should_failslab+0x5/0x20 [ 914.497827][T20234] __kmalloc_track_caller+0x64/0x340 [ 914.503223][T20234] kmemdup+0x21/0x50 [ 914.507545][T20234] nf_log_net_init+0x6f/0x320 [ 914.512624][T20234] ops_init+0x1e7/0x230 [ 914.517033][T20234] ? setup_net+0x79/0x700 [ 914.521617][T20234] setup_net+0x1cb/0x700 [ 914.526063][T20234] copy_net_ns+0x2a9/0x450 [ 914.530663][T20234] create_new_namespaces+0x231/0x560 01:36:59 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x40000000, &(0x7f0000000280)) [ 914.536286][T20234] unshare_nsproxy_namespaces+0xe2/0x120 [ 914.541953][T20234] ksys_unshare+0x381/0x710 [ 914.546665][T20234] __x64_sys_unshare+0x1b/0x20 [ 914.552362][T20234] do_syscall_64+0x4a/0x90 [ 914.556985][T20234] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 914.563572][T20234] RIP: 0033:0x4665d9 [ 914.567470][T20234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.588463][T20234] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 914.597174][T20234] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 914.605294][T20234] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 914.613711][T20234] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.621923][T20234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.629906][T20234] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:00 executing program 3 (fault-call:1 fault-nth:9): unshare(0x6c020200) unshare(0x40000200) 01:37:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x40087602, &(0x7f0000000240)) 01:37:00 executing program 2: ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:37:00 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000000)) 01:37:00 executing program 0: unshare(0x7c060300) unshare(0x20000400) 01:37:00 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xc4ffffff, &(0x7f0000000280)) 01:37:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:37:00 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000015c0)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0xfff, @rand_addr=' \x01\x00', 0x1}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000040)="aa4594ba4572774c4a787d0d2cc2d42d61c50e4d4f14f660ab07660591741459f923c5dc747012a18b56de4f909c7470627f4c176db11599eddbdce708ab47bdd6d900c8335b37323dd9c7c3b136361e84eb64c83c4223596d54447673b7754f3ef2fabf5eb605704e2632bb", 0x6c}, {&(0x7f00000000c0)="29b5fad69425cf98caee76baf3da0b97ffe46afcd5d28693139c4b350c47a0f8fc067adef074935682dc10ccb2398da74b44a30c4b2637a4aae1053898a37b6d35f8bbc10ae8aef236f1c63e287a9f4734a60f6aedb841b462554ae98653656a8e0e58", 0x63}, {&(0x7f0000000140)="5272758434342b50d4d8c31079ef7b0a98d96114ae9ac7bec96cdebfd74c6c70f791d230caed280bd4fa90fd17cd476b8716052c7f53f5115c321c9deb0e68631459897575a6e58b1b9a035e4bf491b7ae145fbe2b7cd5f97ee149d4a6c2f4778498c99b0ad4122c9da47586ca55104facf09eee9d5b0305214c27b6f175047cb335b380eefe1158c1a672a15c7c95d56524252deadded48176b51e40bd22d3afb38567473cd0d5c", 0xa8}], 0x3, &(0x7f0000000240)=[@dstopts={{0x78, 0x29, 0x37, {0x6c, 0xc, '\x00', [@hao={0xc9, 0x10, @private1}, @calipso={0x7, 0x18, {0x1, 0x4, 0x0, 0x2, [0x6, 0x100000000]}}, @ra={0x5, 0x2, 0x2}, @calipso={0x7, 0x18, {0x2, 0x4, 0x8, 0x8, [0x9, 0x1]}}, @ra={0x5, 0x2, 0x40}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}]}}}, @hopopts={{0xa8, 0x29, 0x36, {0x32, 0x11, '\x00', [@generic={0x0, 0x78, "56d90ed24cf8d03904478a7521aedca82e8e95eaa75f4f48cc70c36acc4365165778d1862f9af03dee05947346c695874629a4ea10b77b3aa25c540d1854d7a49f14d570d4d32c909332006c26f3b8d529524dc4ff3309155a166e22176c84aeed79636c3d4b4cc20845acb21c2b0b17e109868df76c4bac"}, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0x2}, @ra={0x5, 0x2, 0xffe1}, @pad1]}}}, @dstopts={{0x68, 0x29, 0x37, {0x16, 0x9, '\x00', [@generic={0xc0, 0x46, "9d4d9dc3ac53c25daad13388310da7d7d9f1e8ae49adb0902ae43cb9f6075dc15b42a61f0021678539dd3d98058e223aa91f754ae52254aace99500e55af0470c44046ec956f"}, @enc_lim={0x4, 0x1, 0x1}]}}}, @rthdr={{0x38, 0x29, 0x39, {0x7c, 0x4, 0x0, 0x20, 0x0, [@loopback, @mcast2]}}}, @hopopts_2292={{0x98, 0x29, 0x36, {0x88, 0xf, '\x00', [@enc_lim={0x4, 0x1, 0xc1}, @generic={0x3, 0x5f, "3ceb355626e7754ca9fccbe2632159317a62fa5b93818e90f7c0062d3f05def62fb9f6c891b01bdbab9332f868daa5e3f4ceca914d8903f573ed99814dc3a89a2b0c6181d58d7f93f2be2c83d77f758652a74152e15aadb9c273f36a541893"}, @calipso={0x7, 0x10, {0x3, 0x2, 0x5, 0x1, [0x4f50dc85]}}, @enc_lim]}}}], 0x258}}, {{&(0x7f00000004c0)={0xa, 0x4e20, 0xfffffffe, @ipv4={'\x00', '\xff\xff', @empty}, 0x6}, 0x1c, &(0x7f0000000640)=[{&(0x7f0000000500)="65effb4e47b953871ef784ca8fd64ca5b0b5b2760cf3ab6b0bda7490f6260dfe33c047df4fdef48224f8a0cd45a335c3109dc139ea351a27dc3f6bfc97bb5f627c53412371c2877d9a8568ccb04e35c9228762c93f12d8eb869cb915344a3563c28bb4840f3f9b4f21207896a816bde829eeb2b4e20f5c02135735da5a729266", 0x80}, {&(0x7f0000000580)="ec1566f8575c04e3f92ee4529c5b189d55b390e8b1b257d224fd80a2df8018f3e66b0e2c", 0x24}, {&(0x7f00000005c0)="9af66f10a9c6e0dc04463a925187c8ef24a12e105e7ebb0e29dd668bd2204ce64abc7484b7f7b1268b49a38d5a920698c103a2787423c52acc274c5aa61d1d1064dce9d24c9a72f75cb6420378e4c07461e6e41f3cd1d3bb37b142d94f2291b5ceed4e83bd", 0x65}], 0x3, &(0x7f0000000680)=[@tclass={{0x14, 0x29, 0x43, 0xf350}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x88, 0xe, 0x0, 0x9, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x1f}, @local, @local, @dev={0xfe, 0x80, '\x00', 0xc}, @mcast1, @dev={0xfe, 0x80, '\x00', 0x1b}]}}}, @dstopts_2292={{0x110, 0x29, 0x4, {0x1d, 0x1e, '\x00', [@calipso={0x7, 0x30, {0x3, 0xa, 0x20, 0x3, [0x6, 0x7fff, 0x7, 0x3, 0x6]}}, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0xffff}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x2}, @generic={0x2, 0x98, "101779f6e765c1b58c408774f00d0927bcc951acba7dd2d521237478c45c5e5c2a976de604db59f754f7d3ca650af4bfc9ad2c51c748441807054588a8e69176e29238883652b8cc332890fe71befe1fb5354b0011df2e6e365b4f8fe5e4f6388fc7207eeb80c367b9acbb65c67a63351a59c5a8e45d0f3f2fdd6a36315146d1e0ab994320be5516823ae28cc3f7df6b50f3f267f6524ce8"}, @hao={0xc9, 0x10, @private0}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x2b, 0x8, 0x2, 0x1, 0x0, [@dev={0xfe, 0x80, '\x00', 0x44}, @dev={0xfe, 0x80, '\x00', 0x1e}, @private1, @mcast1]}}}], 0x208}}, {{&(0x7f00000008c0)={0xa, 0x4e22, 0x0, @empty, 0x4}, 0x1c, &(0x7f00000009c0)=[{&(0x7f0000000900)="f2b62a988490165149af54317238de5e9ba0ded52f3726515fdd26d001e86ba77227d934f7ae9c3aaac4e30a7abc71fc9d15b0fc990beaf0031329741c49c20bea71245025e9920a4c632b783f6db92caac41cdf35cc8abba6a4ef52205ab8200a3035c077286ba4615e25fe99215e9445905b5b50396f13a8a8f257290d4c0535b19a084e3f18fc3b2c942b1e8889178f10a38caed4c6", 0x97}], 0x1, &(0x7f0000000a00)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @dstopts_2292={{0x150, 0x29, 0x4, {0x3b, 0x26, '\x00', [@enc_lim={0x4, 0x1, 0x7f}, @ra, @calipso={0x7, 0x28, {0x3, 0x8, 0x0, 0xff, [0x80000000, 0x7cf, 0xfc77, 0xe65]}}, @generic={0x32, 0xfe, "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"}]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x2c, 0x2, 0x0, 0x1, 0x0, [@private0]}}}, @dstopts_2292={{0x178, 0x29, 0x4, {0x88, 0x2b, '\x00', [@hao={0xc9, 0x10, @private2}, @pad1, @calipso={0x7, 0x50, {0x2, 0x12, 0x9, 0x8, [0xffffffff, 0x0, 0x9, 0x81, 0x3, 0x2, 0x7ff, 0xc8, 0x3fffc0000000000]}}, @calipso={0x7, 0x28, {0x0, 0x8, 0x9, 0x4, [0xd0, 0x6, 0x1, 0x20]}}, @calipso={0x7, 0x10, {0x0, 0x2, 0x1, 0xff, [0x0]}}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @generic={0x3, 0x8f, "29fbcd7c0ab00dd24540f1c10fd64054576f7aafefa079c8604176cabc1a7320c90ebe723ef120f4de1bcba665c12d6b5f247dfb9bd53511744f6cabf55643d5f760a79fc396c8f46457fea30f092a303a596eb6b1c579026ce75d782c41ec73fadd6125ac5f5bb69a104c7a3a68ad62d65d5692f902de997e20545b025fff72ecb24dfcf80fd5a2efc9eff6c6bb92"}, @hao={0xc9, 0x10, @mcast1}, @ra={0x5, 0x2, 0x20}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfffffffd}}, @hopopts_2292={{0x68, 0x29, 0x36, {0x29, 0x9, '\x00', [@pad1, @pad1, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @enc_lim={0x4, 0x1, 0x1}, @calipso={0x7, 0x30, {0x1, 0xa, 0xaf, 0x2, [0x2, 0xffff, 0x4, 0x2, 0x6]}}]}}}, @dstopts={{0x180, 0x29, 0x37, {0x6e, 0x2c, '\x00', [@generic={0xff, 0xed, "8b21945660ef46b6529f8a3ac562b05056e14b5a5ea183a87b87cb9f045dc18777c1e97209791318f2dbcfb53f8d5c154d19b31a4578235ec47306563e11765c18dd57555310cda19e34a5cdbcac27f8d8eb7353b271572f38799247da3bf5b0933e7708a09ce6e4b63ab8014b8bdf5b0c173e7177c67764f381e3bf613745d9e72f9f663b709a06c97055ce71e4854f44871df006e2cdf26ec366e19a5d275e18a8b6d4a8c4365ca493ae501775ffbeca373974e436850ebe983f7e7b9b58bf9e5ab794f6fb8f71ccaf6ae5df18cfed640aaa0df2634458a31daaa56d81a932dc9fc3dc01b0f49b2dd89d5a9e"}, @ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x58, {0x1, 0x14, 0x2, 0x2, [0x7ff, 0x0, 0x1f, 0x0, 0x5, 0x9, 0x4, 0x8, 0x7, 0x621]}}, @hao={0xc9, 0x10, @loopback}, @padn={0x1, 0x1, [0x0]}, @pad1]}}}], 0x520}}, {{&(0x7f0000000f40)={0xa, 0x4e22, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x58f}, 0x1c, &(0x7f0000001440)=[{&(0x7f0000000f80)="1533027a9c4e80ee62e0464cd788cbfd0586d493ce771b4bd6852f021843c1569b75803808803538b5561476c1db2cdeab9a159bff8ab86b35dcfe82c91edd907ba5885d1450ae82918837b8cb389901366743d8f02d177ae7211e961a3875ee2b00b7ab3351455b326e194eda8ec81592284bbc8ef14d8d8974ab48e8053374d14c63", 0x83}, {&(0x7f0000001040)="3f603c6879bf996e5d776fee6fd50d8f2c07a4651fa92a3ebed6eb19bad0966f934a9467a50210450a2bdeb6d76db0b4419fdc32478dd32db0345788abfa2d3f6eaa045744f9e6853a36030079c06c258cc2769d26f53200987c32a9994925f742990e6585ac69b4cab733fef893a49bfe44190a878686ba331d42195c15ab8b602abeda33850f9486b3d9f67f5cd93dd22969e9abe55134495374c76f469c488b343eb154e441a59fd7a3b4299a7e80a394fc295c6ab4d25189f788f26aee0f", 0xc0}, {&(0x7f0000001100)="6981cc3e7646d56966", 0x9}, {&(0x7f0000001140)="85a7ddba0b1b7e93072e499575de4b79", 0x10}, {&(0x7f0000001180)="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", 0xfb}, {&(0x7f0000001280)="7309bd0057f3065f0434cf6908adc395d9e9806024f263a4fcb2477b7b47a958327eff632913b4dcf07f3c125dc63caf69c030557c9398975d062841b67ea432fb1eba06b89a93f3f8cd23d3f09570954dadaacace2fa9378e697d58cf8680fa292710227c81b346c130f215f4fc5db038cc2717d48532a05fceeafcdfc9792cf1c02fc6e19b58c4df9e5b8278d2e5ee", 0x90}, {&(0x7f0000001340)="10f865bf527364b894195cd632b35e7c6eaabf46782fa7c03947673ae87948a3e23641e2546570b88dec0d805047d61bc6c40957b75ff7f047e40e87b7fe6cdb03b5d861c29ccfea3482e4f345453d58c453543f7e0e2fb564dcfe49817f20c3416a5a1b9601cb63accb8019e48e396c35dac2482854d35288c8baf2fdbaddf369e6a9284fb278fc3fb0a5f54fc9", 0x8e}, {&(0x7f0000001400)}], 0x8, &(0x7f00000014c0)}}, {{0x0, 0x0, &(0x7f0000001540)=[{&(0x7f0000001500)="fac84ced2ea75ccedee60565e8082e7c4bd59409722a", 0x16}], 0x1, &(0x7f0000001580)=[@flowinfo={{0x14, 0x29, 0xb, 0x8}}, @tclass={{0x14, 0x29, 0x43, 0x7f}}], 0x30}}], 0x5, 0x20004004) unshare(0x6c020200) unshare(0x20000400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000001400)='./file0\x00', 0x1000000) 01:37:00 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xf8ffffff, &(0x7f0000000280)) [ 914.789501][T20293] FAULT_INJECTION: forcing a failure. [ 914.789501][T20293] name failslab, interval 1, probability 0, space 0, times 0 [ 914.802410][T20293] CPU: 0 PID: 20293 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 914.811965][T20293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 914.822498][T20293] Call Trace: [ 914.825781][T20293] dump_stack+0x137/0x19d [ 914.830133][T20293] should_fail+0x23c/0x250 01:37:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x401c5820, &(0x7f0000000240)) 01:37:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) [ 914.830164][T20293] ? kzalloc+0x16/0x20 [ 914.830179][T20293] __should_failslab+0x81/0x90 [ 914.830201][T20293] should_failslab+0x5/0x20 [ 914.830217][T20293] __kmalloc+0x66/0x340 01:37:00 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xfaffffff, &(0x7f0000000280)) 01:37:00 executing program 3 (fault-call:1 fault-nth:10): unshare(0x6c020200) unshare(0x40000200) 01:37:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x4020940d, &(0x7f0000000240)) [ 914.830241][T20293] kzalloc+0x16/0x20 [ 914.830314][T20293] __register_sysctl_table+0x8c/0xda0 [ 914.830331][T20293] ? nf_log_net_init+0x6f/0x320 [ 914.830352][T20293] ? __module_address+0x1a/0x1d0 [ 914.830371][T20293] register_net_sysctl+0x17c/0x190 [ 914.830418][T20293] nf_log_net_init+0x281/0x320 01:37:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) [ 914.830437][T20293] ops_init+0x1e7/0x230 [ 914.830455][T20293] ? setup_net+0x79/0x700 [ 914.830474][T20293] setup_net+0x1cb/0x700 [ 914.830492][T20293] copy_net_ns+0x2a9/0x450 [ 914.830549][T20293] create_new_namespaces+0x231/0x560 [ 914.830571][T20293] unshare_nsproxy_namespaces+0xe2/0x120 [ 914.830613][T20293] ksys_unshare+0x381/0x710 [ 914.830633][T20293] __x64_sys_unshare+0x1b/0x20 [ 914.830649][T20293] do_syscall_64+0x4a/0x90 [ 914.830668][T20293] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 914.830725][T20293] RIP: 0033:0x4665d9 [ 914.830738][T20293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.830753][T20293] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 914.830772][T20293] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 914.830785][T20293] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 914.830876][T20293] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.830887][T20293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 914.830899][T20293] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 915.002181][T20333] FAULT_INJECTION: forcing a failure. [ 915.002181][T20333] name failslab, interval 1, probability 0, space 0, times 0 [ 915.002205][T20333] CPU: 1 PID: 20333 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 915.002247][T20333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.002256][T20333] Call Trace: [ 915.002262][T20333] dump_stack+0x137/0x19d [ 915.002339][T20333] should_fail+0x23c/0x250 [ 915.002358][T20333] ? kzalloc+0x16/0x20 [ 915.002373][T20333] __should_failslab+0x81/0x90 [ 915.002397][T20333] should_failslab+0x5/0x20 [ 915.002413][T20333] __kmalloc+0x66/0x340 [ 915.002430][T20333] ? kzalloc+0x16/0x20 [ 915.002441][T20333] ? do_proc_douintvec_minmax_conv+0x170/0x170 [ 915.002478][T20333] kzalloc+0x16/0x20 [ 915.002489][T20333] __register_sysctl_table+0x797/0xda0 [ 915.002505][T20333] register_net_sysctl+0x17c/0x190 [ 915.002545][T20333] nf_log_net_init+0x281/0x320 [ 915.002562][T20333] ops_init+0x1e7/0x230 [ 915.002659][T20333] ? setup_net+0x79/0x700 [ 915.002673][T20333] setup_net+0x1cb/0x700 [ 915.002688][T20333] copy_net_ns+0x2a9/0x450 [ 915.002712][T20333] create_new_namespaces+0x231/0x560 [ 915.002851][T20333] unshare_nsproxy_namespaces+0xe2/0x120 [ 915.002875][T20333] ksys_unshare+0x381/0x710 [ 915.002893][T20333] __x64_sys_unshare+0x1b/0x20 [ 915.002982][T20333] do_syscall_64+0x4a/0x90 [ 915.003001][T20333] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 915.003024][T20333] RIP: 0033:0x4665d9 [ 915.003037][T20333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 915.003053][T20333] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 915.003072][T20333] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 915.003085][T20333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 915.003096][T20333] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 915.003120][T20333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 915.003197][T20333] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 915.003219][T20333] sysctl could not get directory: //net -12 [ 915.003233][T20333] CPU: 1 PID: 20333 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 915.003298][T20333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.003305][T20333] Call Trace: [ 915.003309][T20333] dump_stack+0x137/0x19d [ 915.003324][T20333] __register_sysctl_table+0xce7/0xda0 [ 915.003338][T20333] register_net_sysctl+0x17c/0x190 [ 915.003360][T20333] nf_log_net_init+0x281/0x320 [ 915.003380][T20333] ops_init+0x1e7/0x230 [ 915.003447][T20333] ? setup_net+0x79/0x700 [ 915.003464][T20333] setup_net+0x1cb/0x700 [ 915.003493][T20333] copy_net_ns+0x2a9/0x450 [ 915.003508][T20333] create_new_namespaces+0x231/0x560 [ 915.003525][T20333] unshare_nsproxy_namespaces+0xe2/0x120 [ 915.003590][T20333] ksys_unshare+0x381/0x710 [ 915.003633][T20333] __x64_sys_unshare+0x1b/0x20 [ 915.003649][T20333] do_syscall_64+0x4a/0x90 [ 915.003668][T20333] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 915.003690][T20333] RIP: 0033:0x4665d9 [ 915.003700][T20333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:37:00 executing program 4: keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$set_reqkey_keyring(0xe, 0x4) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:00 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xffffffc4, &(0x7f0000000280)) 01:37:00 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:37:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x40247007, &(0x7f0000000240)) 01:37:00 executing program 3 (fault-call:1 fault-nth:11): unshare(0x6c020200) unshare(0x40000200) 01:37:00 executing program 0: unshare(0x10070200) unshare(0x20000400) [ 915.003740][T20333] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 915.003754][T20333] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 915.003833][T20333] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 915.003880][T20333] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 915.003892][T20333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 915.003903][T20333] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:00 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x4024700a, &(0x7f0000000240)) 01:37:00 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xfffffff8, &(0x7f0000000280)) 01:37:00 executing program 0: unshare(0x6c020200) syz_open_dev$sg(&(0x7f0000000000), 0x4, 0x40400) unshare(0x20000400) [ 915.627913][T20377] FAULT_INJECTION: forcing a failure. [ 915.627913][T20377] name failslab, interval 1, probability 0, space 0, times 0 [ 915.640810][T20377] CPU: 1 PID: 20377 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 915.649834][T20377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.660315][T20377] Call Trace: [ 915.663691][T20377] dump_stack+0x137/0x19d [ 915.668109][T20377] should_fail+0x23c/0x250 [ 915.672904][T20377] ? kzalloc+0x16/0x20 [ 915.677639][T20377] __should_failslab+0x81/0x90 [ 915.682596][T20377] should_failslab+0x5/0x20 [ 915.687274][T20377] __kmalloc+0x66/0x340 [ 915.691453][T20377] ? kzalloc+0x16/0x20 [ 915.695594][T20377] ? do_proc_douintvec_minmax_conv+0x170/0x170 [ 915.702012][T20377] kzalloc+0x16/0x20 [ 915.705919][T20377] __register_sysctl_table+0x797/0xda0 [ 915.711477][T20377] register_net_sysctl+0x17c/0x190 [ 915.716750][T20377] nf_log_net_init+0x281/0x320 [ 915.721695][T20377] ops_init+0x1e7/0x230 [ 915.725863][T20377] ? setup_net+0x79/0x700 [ 915.730225][T20377] setup_net+0x1cb/0x700 [ 915.734487][T20377] copy_net_ns+0x2a9/0x450 [ 915.739053][T20377] create_new_namespaces+0x231/0x560 [ 915.744371][T20377] unshare_nsproxy_namespaces+0xe2/0x120 [ 915.750026][T20377] ksys_unshare+0x381/0x710 [ 915.754538][T20377] __x64_sys_unshare+0x1b/0x20 [ 915.759377][T20377] do_syscall_64+0x4a/0x90 [ 915.763832][T20377] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 915.769945][T20377] RIP: 0033:0x4665d9 [ 915.773989][T20377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 915.793694][T20377] RSP: 002b:00007f2bd7c2b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 915.802165][T20377] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 915.810142][T20377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 915.818151][T20377] RBP: 00007f2bd7c2b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 915.826128][T20377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 915.834416][T20377] R13: 00007ffeeed9066f R14: 00007f2bd7c2b300 R15: 0000000000022000 [ 915.842449][T20377] sysctl could not get directory: //net -12 [ 915.848463][T20377] CPU: 1 PID: 20377 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 915.857276][T20377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 915.867829][T20377] Call Trace: [ 915.871117][T20377] dump_stack+0x137/0x19d [ 915.875446][T20377] __register_sysctl_table+0xce7/0xda0 [ 915.881087][T20377] register_net_sysctl+0x17c/0x190 [ 915.886268][T20377] nf_log_net_init+0x281/0x320 [ 915.891058][T20377] ops_init+0x1e7/0x230 [ 915.895324][T20377] ? setup_net+0x79/0x700 [ 915.899786][T20377] setup_net+0x1cb/0x700 [ 915.904113][T20377] copy_net_ns+0x2a9/0x450 [ 915.908859][T20377] create_new_namespaces+0x231/0x560 [ 915.914871][T20377] unshare_nsproxy_namespaces+0xe2/0x120 [ 915.920732][T20377] ksys_unshare+0x381/0x710 [ 915.925517][T20377] __x64_sys_unshare+0x1b/0x20 [ 915.930307][T20377] do_syscall_64+0x4a/0x90 [ 915.935132][T20377] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 915.941143][T20377] RIP: 0033:0x4665d9 [ 915.945121][T20377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 915.965468][T20377] RSP: 002b:00007f2bd7c2b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 01:37:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x1, 0x1, {0x33, 0x30, 0x8, 0x2, 0x5, 0x9, 0x2, 0x10a, 0x1}}) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:01 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:37:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x4028700f, &(0x7f0000000240)) 01:37:01 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xfffffffa, &(0x7f0000000280)) 01:37:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80086601, &(0x7f0000000240)) 01:37:01 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:37:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x8008700b, &(0x7f0000000240)) [ 915.974091][T20377] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 915.982711][T20377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 915.990801][T20377] RBP: 00007f2bd7c2b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 915.998965][T20377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 916.007136][T20377] R13: 00007ffeeed9066f R14: 00007f2bd7c2b300 R15: 0000000000022000 01:37:01 executing program 3 (fault-call:1 fault-nth:12): unshare(0x6c020200) unshare(0x40000200) 01:37:01 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x4, 0x202) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x3) 01:37:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80087601, &(0x7f0000000240)) 01:37:01 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:37:01 executing program 0: r0 = gettid() r1 = gettid() syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) ptrace$getenv(0x4201, r1, 0x1f, &(0x7f0000000000)) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/95) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r2 = gettid() ptrace$pokeuser(0x6, r2, 0x0, 0x0) r3 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000140)={{0x0, 0xee01, 0x0, 0x0, 0x0, 0x9, 0x1}, 0x0, 0x0, 0x2, 0x5, 0xfffffffffffffffa, 0x3, 0x54f4c116, 0xff25, 0xff, 0x4, r2, r3}) ptrace$pokeuser(0x6, r2, 0x0, 0x0) r4 = gettid() ptrace$pokeuser(0x6, r1, 0x7ff, 0x800000000000) ptrace$setopts(0x4200, r4, 0x5, 0x19) getpgid(r0) unshare(0x6c020200) getpid() unshare(0x20000400) r5 = socket(0xa, 0xa, 0xfffffff9) syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r5) 01:37:01 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x9}) 01:37:01 executing program 4: r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000100)=""/4096) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x101, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) 01:37:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x801c581f, &(0x7f0000000240)) [ 916.200330][T20440] FAULT_INJECTION: forcing a failure. [ 916.200330][T20440] name failslab, interval 1, probability 0, space 0, times 0 [ 916.213031][T20440] CPU: 1 PID: 20440 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 916.221842][T20440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.232064][T20440] Call Trace: [ 916.235387][T20440] dump_stack+0x137/0x19d [ 916.239732][T20440] should_fail+0x23c/0x250 [ 916.244165][T20440] ? kzalloc+0x16/0x20 01:37:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x28000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000000)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@mcast2, @in=@multicast1, 0x4e20, 0x8, 0x4e22, 0x1, 0x2, 0x80, 0x80, 0x3c, 0x0, 0xee01}, {0x1, 0x11, 0x4000000000, 0x8ed0, 0xfffffffffffffffe, 0x5b30, 0x7145, 0x5}, {0x1, 0x4, 0x4, 0x3}, 0x200, 0x6e6bbd, 0x2, 0x1, 0x0, 0x3}, {{@in=@local, 0x4d2, 0x33}, 0xa, @in=@rand_addr=0x64010100, 0x0, 0x1, 0x0, 0x42, 0xffff, 0xb90, 0x5775}}, 0xe8) 01:37:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247008, &(0x7f0000000240)) [ 916.248246][T20440] __should_failslab+0x81/0x90 [ 916.253025][T20440] should_failslab+0x5/0x20 [ 916.257550][T20440] __kmalloc+0x66/0x340 [ 916.261737][T20440] ? drop_sysctl_table+0x68/0x2d0 [ 916.266900][T20440] ? do_proc_douintvec_minmax_conv+0x170/0x170 [ 916.273802][T20440] kzalloc+0x16/0x20 [ 916.277829][T20440] __register_sysctl_table+0x797/0xda0 [ 916.283356][T20440] register_net_sysctl+0x17c/0x190 [ 916.288485][T20440] nf_log_net_init+0x281/0x320 [ 916.293355][T20440] ops_init+0x1e7/0x230 01:37:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000000)) 01:37:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80287010, &(0x7f0000000240)) [ 916.297701][T20440] ? setup_net+0x79/0x700 [ 916.302108][T20440] setup_net+0x1cb/0x700 [ 916.306361][T20440] copy_net_ns+0x2a9/0x450 [ 916.310784][T20440] create_new_namespaces+0x231/0x560 [ 916.316086][T20440] unshare_nsproxy_namespaces+0xe2/0x120 [ 916.321854][T20440] ksys_unshare+0x381/0x710 [ 916.326432][T20440] __x64_sys_unshare+0x1b/0x20 [ 916.331363][T20440] do_syscall_64+0x4a/0x90 [ 916.335846][T20440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 916.341835][T20440] RIP: 0033:0x4665d9 [ 916.345800][T20440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.365434][T20440] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 916.373857][T20440] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 916.382070][T20440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 916.390088][T20440] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 916.398145][T20440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 916.406376][T20440] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 916.414527][T20440] sysctl could not get directory: /net/netfilter//nf_log -12 [ 916.421950][T20440] CPU: 1 PID: 20440 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 916.430729][T20440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.440868][T20440] Call Trace: [ 916.444147][T20440] dump_stack+0x137/0x19d [ 916.448489][T20440] __register_sysctl_table+0xce7/0xda0 [ 916.454254][T20440] register_net_sysctl+0x17c/0x190 [ 916.459410][T20440] nf_log_net_init+0x281/0x320 [ 916.464248][T20440] ops_init+0x1e7/0x230 [ 916.468455][T20440] ? setup_net+0x79/0x700 [ 916.472851][T20440] setup_net+0x1cb/0x700 [ 916.477482][T20440] copy_net_ns+0x2a9/0x450 [ 916.481943][T20440] create_new_namespaces+0x231/0x560 [ 916.487226][T20440] unshare_nsproxy_namespaces+0xe2/0x120 [ 916.493015][T20440] ksys_unshare+0x381/0x710 [ 916.497948][T20440] __x64_sys_unshare+0x1b/0x20 [ 916.502715][T20440] do_syscall_64+0x4a/0x90 [ 916.507309][T20440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 916.513351][T20440] RIP: 0033:0x4665d9 [ 916.517232][T20440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.536919][T20440] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 916.545383][T20440] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 916.553355][T20440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 916.561410][T20440] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 916.569512][T20440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 916.577689][T20440] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:01 executing program 3 (fault-call:1 fault-nth:13): unshare(0x6c020200) unshare(0x40000200) 01:37:01 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0xc0045878, &(0x7f0000000240)) 01:37:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x35, 0x31, 0x6, 0x2, 0x9, 0xfffffffd, 0x4, 0xcd, 0xffffffffffffffff}) 01:37:01 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:37:01 executing program 0: unshare(0x14020800) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'raw\x00', 0x2, [{}, {}]}, 0x48) unshare(0x20000400) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1ff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x80) 01:37:01 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x11}) 01:37:02 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0xc0045878, &(0x7f0000000240)) 01:37:02 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x22c002, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x85, 0x50000) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_AIE_ON(r2, 0x7001) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) 01:37:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:37:02 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0xc0189436, &(0x7f0000000240)) 01:37:02 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x13}) 01:37:02 executing program 0: unshare(0x6c020200) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x48) unshare(0x60000400) [ 916.717333][T20489] FAULT_INJECTION: forcing a failure. [ 916.717333][T20489] name failslab, interval 1, probability 0, space 0, times 0 [ 916.730427][T20489] CPU: 1 PID: 20489 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 916.739316][T20489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.739331][T20489] Call Trace: [ 916.739337][T20489] dump_stack+0x137/0x19d [ 916.739362][T20489] should_fail+0x23c/0x250 [ 916.739381][T20489] ? __proc_create+0x3c1/0x680 01:37:02 executing program 3 (fault-call:1 fault-nth:14): unshare(0x6c020200) unshare(0x40000200) 01:37:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x200) 01:37:02 executing program 0: unshare(0x10000000) unshare(0x70060400) getgid() 01:37:02 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0xc020660b, &(0x7f0000000240)) 01:37:02 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x900}) [ 916.739457][T20489] __should_failslab+0x81/0x90 [ 916.739479][T20489] should_failslab+0x5/0x20 [ 916.739495][T20489] kmem_cache_alloc+0x46/0x2f0 [ 916.739514][T20489] ? _find_next_bit+0x188/0x190 [ 916.739544][T20489] __proc_create+0x3c1/0x680 [ 916.739563][T20489] ? pcpu_alloc+0xc50/0x1200 01:37:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(0x0, 0x80000001, 0x200) [ 916.739584][T20489] proc_create_reg+0x89/0xe0 [ 916.739604][T20489] proc_create_net_data+0x58/0xf0 [ 916.739662][T20489] netlink_net_init+0x3c/0x50 01:37:02 executing program 0: unshare(0x6c020200) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000040), 0xffffffffffff14c0, 0x2800) unshare(0x24000400) unshare(0x10000) unshare(0x4040000) [ 916.739682][T20489] ops_init+0x1e7/0x230 [ 916.739703][T20489] ? setup_net+0x79/0x700 [ 916.739723][T20489] setup_net+0x1cb/0x700 [ 916.739755][T20489] copy_net_ns+0x2a9/0x450 [ 916.739774][T20489] create_new_namespaces+0x231/0x560 [ 916.739798][T20489] unshare_nsproxy_namespaces+0xe2/0x120 [ 916.739822][T20489] ksys_unshare+0x381/0x710 [ 916.739858][T20489] __x64_sys_unshare+0x1b/0x20 [ 916.739875][T20489] do_syscall_64+0x4a/0x90 [ 916.739896][T20489] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 916.739919][T20489] RIP: 0033:0x4665d9 [ 916.739942][T20489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.739969][T20489] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 916.739988][T20489] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 916.740001][T20489] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 916.740061][T20489] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 916.740073][T20489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 916.740085][T20489] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 916.954123][T20538] FAULT_INJECTION: forcing a failure. [ 916.954123][T20538] name failslab, interval 1, probability 0, space 0, times 0 [ 916.954172][T20538] CPU: 0 PID: 20538 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 916.954188][T20538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.954196][T20538] Call Trace: [ 916.954202][T20538] dump_stack+0x137/0x19d [ 916.954222][T20538] should_fail+0x23c/0x250 [ 916.954237][T20538] ? kzalloc+0x16/0x20 [ 916.954252][T20538] __should_failslab+0x81/0x90 [ 916.954313][T20538] should_failslab+0x5/0x20 [ 916.954325][T20538] __kmalloc+0x66/0x340 [ 916.954384][T20538] ? proc_create_net_data+0xbe/0xf0 [ 916.954402][T20538] kzalloc+0x16/0x20 [ 916.954428][T20538] ops_init+0x58/0x230 [ 916.954446][T20538] ? setup_net+0x79/0x700 [ 916.954465][T20538] setup_net+0x1cb/0x700 [ 916.954542][T20538] copy_net_ns+0x2a9/0x450 [ 916.954559][T20538] create_new_namespaces+0x231/0x560 [ 916.954581][T20538] unshare_nsproxy_namespaces+0xe2/0x120 [ 916.954653][T20538] ksys_unshare+0x381/0x710 [ 916.954719][T20538] __x64_sys_unshare+0x1b/0x20 [ 916.954736][T20538] do_syscall_64+0x4a/0x90 [ 916.954755][T20538] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 916.954773][T20538] RIP: 0033:0x4665d9 [ 916.954783][T20538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.954875][T20538] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 916.954889][T20538] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 916.954898][T20538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 916.954909][T20538] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 916.954921][T20538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 916.954931][T20538] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 916.981809][T20551] ================================================================== [ 916.981832][T20551] BUG: KCSAN: data-race in pcpu_alloc / pcpu_free_area [ 916.981855][T20551] [ 916.981859][T20551] write to 0xffffffff8455f74c of 4 bytes by task 8 on cpu 0: [ 916.981873][T20551] pcpu_free_area+0x50c/0x5a0 [ 916.981893][T20551] free_percpu+0x1d2/0x690 [ 916.981918][T20551] sock_inuse_exit_net+0x39/0x40 [ 916.981938][T20551] cleanup_net+0x445/0x900 [ 916.981956][T20551] process_one_work+0x3e9/0x8f0 [ 916.981976][T20551] worker_thread+0x636/0xae0 [ 916.981995][T20551] kthread+0x1d0/0x1f0 [ 916.982012][T20551] ret_from_fork+0x1f/0x30 [ 916.982027][T20551] [ 916.982032][T20551] read to 0xffffffff8455f74c of 4 bytes by task 20551 on cpu 1: [ 916.982046][T20551] pcpu_alloc+0xa33/0x1200 [ 916.982062][T20551] __alloc_percpu+0x20/0x30 [ 916.982080][T20551] sock_inuse_init_net+0x1c/0xa0 [ 916.982098][T20551] ops_init+0x1e7/0x230 [ 916.982115][T20551] setup_net+0x1cb/0x700 [ 916.982131][T20551] copy_net_ns+0x2a9/0x450 [ 916.982147][T20551] create_new_namespaces+0x231/0x560 [ 916.982167][T20551] unshare_nsproxy_namespaces+0xe2/0x120 [ 916.982187][T20551] ksys_unshare+0x381/0x710 [ 916.982203][T20551] __x64_sys_unshare+0x1b/0x20 [ 916.982219][T20551] do_syscall_64+0x4a/0x90 [ 916.982238][T20551] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 916.982259][T20551] [ 916.982262][T20551] value changed: 0x0000004d -> 0x0000004e [ 916.982271][T20551] [ 916.982274][T20551] Reported by Kernel Concurrency Sanitizer on: 01:37:02 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:02 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:37:02 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x1100}) 01:37:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(0x0, 0x80000001, 0x200) 01:37:02 executing program 0: unshare(0xe1725c2882e69788) unshare(0x20000400) 01:37:02 executing program 3 (fault-call:1 fault-nth:15): unshare(0x6c020200) unshare(0x40000200) [ 916.982280][T20551] CPU: 1 PID: 20551 Comm: syz-executor.0 Not tainted 5.13.0-rc5-syzkaller #0 [ 916.982298][T20551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 916.982307][T20551] ================================================================== 01:37:02 executing program 0: unshare(0x6c020200) r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x4, 0x24302) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x28}}, 0x20008800) unshare(0x20000400) 01:37:02 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(0x0, 0x80000001, 0x200) [ 917.558297][T20574] FAULT_INJECTION: forcing a failure. [ 917.558297][T20574] name failslab, interval 1, probability 0, space 0, times 0 [ 917.571133][T20574] CPU: 1 PID: 20574 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 917.579900][T20574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.589966][T20574] Call Trace: [ 917.589974][T20574] dump_stack+0x137/0x19d [ 917.590078][T20574] should_fail+0x23c/0x250 [ 917.590113][T20574] ? sock_alloc_inode+0x23/0x90 01:37:02 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0xa, 0x12, 0x17, 0xe, 0x2, 0x2, 0x6, 0xa9}}) 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x1300}) [ 917.590133][T20574] __should_failslab+0x81/0x90 [ 917.611874][T20574] ? sockfs_init_fs_context+0x70/0x70 [ 917.617251][T20574] should_failslab+0x5/0x20 [ 917.622371][T20574] kmem_cache_alloc+0x46/0x2f0 [ 917.627176][T20574] ? selinux_socket_create+0x7c/0x170 [ 917.632729][T20574] ? sockfs_init_fs_context+0x70/0x70 [ 917.638118][T20574] sock_alloc_inode+0x23/0x90 [ 917.642839][T20574] ? sockfs_init_fs_context+0x70/0x70 [ 917.648243][T20574] new_inode_pseudo+0x38/0x1c0 [ 917.653045][T20574] sock_create_lite+0x72/0x280 01:37:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x200) [ 917.657891][T20574] ? rb_insert_color+0x2dc/0x310 [ 917.662899][T20574] __netlink_kernel_create+0x9c/0x5e0 [ 917.662925][T20574] rtnetlink_net_init+0x48/0xa0 [ 917.673294][T20574] ? rtnetlink_net_exit+0x40/0x40 [ 917.678333][T20574] ? rtnetlink_rcv+0x20/0x20 [ 917.682930][T20574] ops_init+0x1e7/0x230 [ 917.687225][T20574] ? setup_net+0x79/0x700 [ 917.691637][T20574] setup_net+0x1cb/0x700 [ 917.695887][T20574] copy_net_ns+0x2a9/0x450 [ 917.700317][T20574] create_new_namespaces+0x231/0x560 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x4000}) 01:37:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x200) [ 917.705636][T20574] unshare_nsproxy_namespaces+0xe2/0x120 [ 917.711279][T20574] ksys_unshare+0x381/0x710 [ 917.715800][T20574] __x64_sys_unshare+0x1b/0x20 [ 917.720570][T20574] do_syscall_64+0x4a/0x90 [ 917.725021][T20574] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 917.730974][T20574] RIP: 0033:0x4665d9 [ 917.734897][T20574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.755000][T20574] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 917.763712][T20574] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 917.771785][T20574] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 917.779908][T20574] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.779927][T20574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:37:03 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x1000000}) 01:37:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x200) 01:37:03 executing program 0: io_setup(0x2, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)) unshare(0x68028600) unshare(0x20000400) [ 917.780014][T20574] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:03 executing program 3 (fault-call:1 fault-nth:16): unshare(0x6c020200) unshare(0x40000200) 01:37:03 executing program 4: ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x2800, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x9000000}) 01:37:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x0) 01:37:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x0) 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x11000000}) 01:37:03 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x59f940) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000040)={'ah\x00'}, &(0x7f0000000080)=0x1e) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/firmware/memmap', 0x2000, 0x40) [ 917.941258][T20647] FAULT_INJECTION: forcing a failure. [ 917.941258][T20647] name failslab, interval 1, probability 0, space 0, times 0 [ 917.956745][T20647] CPU: 1 PID: 20647 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 917.966323][T20647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 917.979163][T20647] Call Trace: [ 917.982925][T20647] dump_stack+0x137/0x19d 01:37:03 executing program 0: unshare(0x6c020200) unshare(0x20000400) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in=@remote, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/firmware/dmi', 0xd0000, 0x100) 01:37:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x0) 01:37:03 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x6743) pipe2(&(0x7f0000000000), 0x4000) r1 = syz_open_dev$vcsa(&(0x7f0000000180), 0x3, 0x101000) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x154, 0x0, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@private=0xa010100}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5c}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_batadv\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1f}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7ff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffff}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x1ff}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe340}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x84e}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0x154}, 0x1, 0x0, 0x0, 0x10}, 0x10) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/snd_seq', 0x0, 0x80) ioctl$SG_GET_KEEP_ORPHAN(r3, 0x2288, &(0x7f0000000100)) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) bind$inet6(r3, &(0x7f0000000140)={0xa, 0x4e23, 0x2, @rand_addr=' \x01\x00', 0x9}, 0x1c) [ 917.987269][T20647] should_fail+0x23c/0x250 [ 917.987299][T20647] ? security_inode_alloc+0x30/0x180 [ 917.987323][T20647] __should_failslab+0x81/0x90 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x13000000}) [ 917.987399][T20647] should_failslab+0x5/0x20 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x40000000}) [ 917.987411][T20647] kmem_cache_alloc+0x46/0x2f0 [ 917.987429][T20647] security_inode_alloc+0x30/0x180 [ 917.987451][T20647] inode_init_always+0x20b/0x420 [ 917.987545][T20647] ? sockfs_init_fs_context+0x70/0x70 [ 917.987565][T20647] new_inode_pseudo+0x73/0x1c0 [ 917.987579][T20647] sock_create_lite+0x72/0x280 [ 917.987655][T20647] ? rb_insert_color+0x2dc/0x310 [ 917.987673][T20647] __netlink_kernel_create+0x9c/0x5e0 [ 917.987692][T20647] rtnetlink_net_init+0x48/0xa0 [ 917.987711][T20647] ? rtnetlink_net_exit+0x40/0x40 [ 917.987779][T20647] ? rtnetlink_rcv+0x20/0x20 [ 917.987795][T20647] ops_init+0x1e7/0x230 [ 917.987811][T20647] ? setup_net+0x79/0x700 [ 917.987825][T20647] setup_net+0x1cb/0x700 01:37:03 executing program 3 (fault-call:1 fault-nth:17): unshare(0x6c020200) unshare(0x40000200) [ 917.987846][T20647] copy_net_ns+0x2a9/0x450 [ 917.987866][T20647] create_new_namespaces+0x231/0x560 [ 917.987946][T20647] unshare_nsproxy_namespaces+0xe2/0x120 [ 917.987964][T20647] ksys_unshare+0x381/0x710 [ 917.987980][T20647] __x64_sys_unshare+0x1b/0x20 [ 917.988045][T20647] do_syscall_64+0x4a/0x90 [ 917.988180][T20647] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 917.988197][T20647] RIP: 0033:0x4665d9 [ 917.988244][T20647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 917.988260][T20647] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 917.988278][T20647] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 917.988298][T20647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 917.988311][T20647] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 917.988346][T20647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 917.988356][T20647] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 918.220789][T20699] FAULT_INJECTION: forcing a failure. [ 918.220789][T20699] name failslab, interval 1, probability 0, space 0, times 0 [ 918.320926][T20699] CPU: 0 PID: 20699 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 918.320941][T20699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.320947][T20699] Call Trace: [ 918.321003][T20699] dump_stack+0x137/0x19d [ 918.321020][T20699] should_fail+0x23c/0x250 [ 918.321031][T20699] ? sk_prot_alloc+0xb8/0x190 [ 918.321043][T20699] __should_failslab+0x81/0x90 [ 918.321058][T20699] should_failslab+0x5/0x20 [ 918.321068][T20699] __kmalloc+0x66/0x340 [ 918.321080][T20699] sk_prot_alloc+0xb8/0x190 [ 918.321119][T20699] sk_alloc+0x2e/0x220 [ 918.321152][T20699] __netlink_kernel_create+0xf4/0x5e0 [ 918.385000][T20699] rtnetlink_net_init+0x48/0xa0 [ 918.385030][T20699] ? rtnetlink_net_exit+0x40/0x40 [ 918.394943][T20699] ? rtnetlink_rcv+0x20/0x20 [ 918.394964][T20699] ops_init+0x1e7/0x230 [ 918.394981][T20699] ? setup_net+0x79/0x700 [ 918.394995][T20699] setup_net+0x1cb/0x700 [ 918.395036][T20699] copy_net_ns+0x2a9/0x450 [ 918.417090][T20699] create_new_namespaces+0x231/0x560 [ 918.417119][T20699] unshare_nsproxy_namespaces+0xe2/0x120 [ 918.428197][T20699] ksys_unshare+0x381/0x710 [ 918.432804][T20699] __x64_sys_unshare+0x1b/0x20 [ 918.437577][T20699] do_syscall_64+0x4a/0x90 [ 918.442011][T20699] entry_SYSCALL_64_after_hwframe+0x44/0xae 01:37:03 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0xc4ffffff}) 01:37:03 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x40) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x2, 0x80040) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r3 = syz_open_dev$rtc(&(0x7f0000000040), 0x3c4, 0x803) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000080)={0x1, 0x0, {0x1f, 0x20, 0x2, 0x4, 0xa, 0x4, 0x1, 0xcb, 0x660efebf3ceb5435}}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000100)={0x1b, 0x1a, 0x3, 0x13, 0x8, 0x6, 0x6, 0x124, 0x1}) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000240)) [ 918.447936][T20699] RIP: 0033:0x4665d9 [ 918.451855][T20699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 918.471605][T20699] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 918.471631][T20699] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 918.471644][T20699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 01:37:03 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x111400, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0xf8ffffff}) 01:37:03 executing program 0: unshare(0x6c020200) unshare(0x34000000) r0 = socket$inet6(0xa, 0x4, 0xddd) setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f0000000000)={0x7ff, {{0xa, 0x4e22, 0x5, @mcast1, 0x1000}}, {{0xa, 0x4e24, 0x80000000, @local, 0x6}}}, 0x108) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000280)={'filter\x00', 0x0, [0x100, 0xb2, 0x9, 0xff, 0x2]}, &(0x7f0000000300)=0x54) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/bus/machinecheck', 0x0, 0xc9) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r3}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@rand_addr=0x64010101, @in=@multicast1, 0x4e21, 0x0, 0x4e21, 0x5f4, 0x2, 0x80, 0x80, 0x5e, r3, 0xffffffffffffffff}, {0xfff, 0x9, 0x0, 0xc7b, 0x20, 0x2, 0x6, 0x2}, {0x72, 0x4, 0xd83, 0x3}, 0x80000000, 0x6e6bbd, 0x1, 0x0, 0x0, 0x2}, {{@in=@local, 0x4d6, 0x3c}, 0x2, @in6=@mcast1, 0x3506, 0x2, 0x3, 0x19, 0x60, 0xffff, 0x20}}, 0xe8) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000240)=0x6, 0x4) syz_open_dev$sg(&(0x7f00000003c0), 0xca, 0x2000) 01:37:03 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:03 executing program 3 (fault-call:1 fault-nth:18): unshare(0x6c020200) unshare(0x40000200) [ 918.498325][T20699] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 918.498341][T20699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 918.498354][T20699] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:03 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0xfaffffff}) [ 918.623236][T20733] FAULT_INJECTION: forcing a failure. [ 918.623236][T20733] name failslab, interval 1, probability 0, space 0, times 0 [ 918.636579][T20733] CPU: 0 PID: 20733 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 918.645609][T20733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 918.656113][T20733] Call Trace: [ 918.659522][T20733] dump_stack+0x137/0x19d [ 918.663987][T20733] should_fail+0x23c/0x250 [ 918.669138][T20733] __should_failslab+0x81/0x90 [ 918.674136][T20733] ? selinux_sk_alloc_security+0x70/0xf0 [ 918.679867][T20733] should_failslab+0x5/0x20 [ 918.684364][T20733] kmem_cache_alloc_trace+0x49/0x310 [ 918.689708][T20733] ? sk_prot_alloc+0xb8/0x190 [ 918.694740][T20733] selinux_sk_alloc_security+0x70/0xf0 [ 918.700432][T20733] security_sk_alloc+0x45/0x90 [ 918.705200][T20733] sk_prot_alloc+0xd2/0x190 [ 918.709913][T20733] sk_alloc+0x2e/0x220 [ 918.713992][T20733] __netlink_kernel_create+0xf4/0x5e0 [ 918.719382][T20733] rtnetlink_net_init+0x48/0xa0 [ 918.724244][T20733] ? rtnetlink_net_exit+0x40/0x40 [ 918.729268][T20733] ? rtnetlink_rcv+0x20/0x20 [ 918.733877][T20733] ops_init+0x1e7/0x230 [ 918.738142][T20733] ? setup_net+0x79/0x700 [ 918.742474][T20733] setup_net+0x1cb/0x700 [ 918.746706][T20733] copy_net_ns+0x2a9/0x450 [ 918.751253][T20733] create_new_namespaces+0x231/0x560 [ 918.756545][T20733] unshare_nsproxy_namespaces+0xe2/0x120 [ 918.762278][T20733] ksys_unshare+0x381/0x710 [ 918.766872][T20733] __x64_sys_unshare+0x1b/0x20 [ 918.771621][T20733] do_syscall_64+0x4a/0x90 [ 918.776051][T20733] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 918.782279][T20733] RIP: 0033:0x4665d9 [ 918.786414][T20733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 918.806265][T20733] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 918.814727][T20733] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:37:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000140)={0x14, 0x2b, 0xa, 0xf, 0x5, 0x1, 0x2, 0xd1}) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000080)) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000100), 0xffffffffffffffff) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) ioctl$RTC_UIE_ON(r4, 0x7003) 01:37:04 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:37:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0xffffffc4}) [ 918.822943][T20733] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 918.830916][T20733] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 918.838895][T20733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 918.846853][T20733] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:04 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r1 = syz_open_dev$vcsa(&(0x7f0000000300), 0x7, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000340)={{0xa, 0x4e20, 0x312d, @mcast2, 0x5}, {0xa, 0x4e23, 0xfffffe00, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3}, 0x58, [0x40, 0x9, 0x80000000, 0x1, 0x81, 0x2, 0x3, 0x9]}, 0x5c) io_setup(0xfffffffe, &(0x7f0000000000)=0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000040), 0xfffffffffffffffc, 0x404000) ioctl$RTC_WIE_OFF(r3, 0x7010) io_destroy(r2) r4 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000100)=""/177) msgget$private(0x0, 0x92) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) io_cancel(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xc, 0x4926, r5, &(0x7f0000000280)="51e00529775fab683330d9626b5707ef21add51ce1b5fe477341243444ad7bd0aa9f68d6c238d13bbc0c74d8b362b1c3258b218246281e724c46b7e98b9f8cb61a43781c203c0c7a2df386d93746b0c5b8f2", 0x52, 0x0, 0x0, 0x1, r3}, &(0x7f0000000200)) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:37:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0xc000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0xfffffff8}) 01:37:04 executing program 3 (fault-call:1 fault-nth:19): unshare(0x6c020200) unshare(0x40000200) 01:37:04 executing program 1: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000000)={{0xa, 0x4e20, 0x2, @loopback, 0x1}, {0xa, 0x4e23, 0x0, @empty, 0x3d2}, 0x2, [0xe4, 0x1000, 0x1, 0x0, 0x6, 0x40, 0x8]}, 0x5c) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:37:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 0: unshare(0x6c020200) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) sched_rr_get_interval(r0, &(0x7f0000000100)) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) getpid() r2 = gettid() r3 = gettid() ptrace$pokeuser(0x6, r3, 0x0, 0x0) ptrace$pokeuser(0x6, r3, 0x1, 0x7b4) ptrace$pokeuser(0x6, r0, 0xfffffffffffffa01, 0x3) wait4(r1, &(0x7f00000001c0), 0x1000000, &(0x7f0000000200)) getpid() unshare(0x20000400) r4 = getpgrp(r1) prlimit64(r4, 0xc, &(0x7f0000000140)={0x2, 0x9}, &(0x7f0000000180)) tgkill(0xffffffffffffffff, r2, 0x40) getpriority(0x0, r1) unshare(0x4020280) 01:37:04 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0xfffffffa}) 01:37:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:37:04 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) msgsnd(r1, &(0x7f0000000100)={0x1, "9c358810eb6d19079576b0c9cfa520c917f846ae52c3de6fdf429c0c139a8d6422b4313924bbb67de0ac3dc128ac35ad513572da8c7632e49519b19ad5030c9b01e1ec678d0ab588542c92594d646a4dbba2f0c3b0611a0360064f4de6ce14ac763803f4aacfb2a8e2ade1746119f6c44aacdcf289b66e2e3e173cdebb4fb4a6326f7b14c196efbcc39f64b0d5a4937c18ff9a5a20c8fc9bc7264150b3bc1b55caa58ddc68c4eef6057cb280918f2e0d5cb59b83fe3226bb7e7c6939e39f515e0c97aa08ef341e96072b826c4399ccb3b0f510b9685de5"}, 0xdf, 0x0) set_mempolicy(0x2, &(0x7f0000000280)=0x3, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x90) r3 = socket(0x3, 0x5, 0x56) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e20, 0x1, @remote}, {0xa, 0x4e21, 0x3ff, @dev={0xfe, 0x80, '\x00', 0xf}, 0x1}, 0xfff8, [0x7, 0x6, 0x1, 0x7, 0x0, 0x3ff, 0x9b0, 0x8f0]}, 0x5c) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:37:04 executing program 0: unshare(0x6c020200) unshare(0x20000400) r0 = socket(0x11, 0x3, 0x7fff) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) accept$inet6(r0, 0x0, &(0x7f0000000000)) 01:37:04 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) [ 919.145920][T20806] FAULT_INJECTION: forcing a failure. [ 919.145920][T20806] name failslab, interval 1, probability 0, space 0, times 0 [ 919.158865][T20806] CPU: 0 PID: 20806 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 919.167648][T20806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.177715][T20806] Call Trace: [ 919.181000][T20806] dump_stack+0x137/0x19d [ 919.185347][T20806] should_fail+0x23c/0x250 [ 919.189883][T20806] ? kzalloc+0x1d/0x30 01:37:04 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x9}) 01:37:04 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x11}) [ 919.193979][T20806] __should_failslab+0x81/0x90 [ 919.198880][T20806] should_failslab+0x5/0x20 [ 919.203411][T20806] __kmalloc+0x66/0x340 [ 919.207586][T20806] ? sk_prot_alloc+0x125/0x190 [ 919.212368][T20806] ? init_timer_key+0x72/0x100 [ 919.217149][T20806] kzalloc+0x1d/0x30 [ 919.221051][T20806] __netlink_kernel_create+0x22d/0x5e0 [ 919.226524][T20806] rtnetlink_net_init+0x48/0xa0 [ 919.231389][T20806] ? rtnetlink_net_exit+0x40/0x40 [ 919.236615][T20806] ? rtnetlink_rcv+0x20/0x20 [ 919.241454][T20806] ops_init+0x1e7/0x230 01:37:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) [ 919.245623][T20806] ? setup_net+0x79/0x700 [ 919.250348][T20806] setup_net+0x1cb/0x700 [ 919.254679][T20806] copy_net_ns+0x2a9/0x450 [ 919.259109][T20806] create_new_namespaces+0x231/0x560 [ 919.265144][T20806] unshare_nsproxy_namespaces+0xe2/0x120 [ 919.271186][T20806] ksys_unshare+0x381/0x710 [ 919.275695][T20806] __x64_sys_unshare+0x1b/0x20 [ 919.280888][T20806] do_syscall_64+0x4a/0x90 [ 919.285619][T20806] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 919.291753][T20806] RIP: 0033:0x4665d9 [ 919.295712][T20806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.315515][T20806] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 919.324010][T20806] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 919.332275][T20806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 919.340860][T20806] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.349018][T20806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.357535][T20806] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:04 executing program 3 (fault-call:1 fault-nth:20): unshare(0x6c020200) unshare(0x40000200) 01:37:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0xa0080, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@mcast2, @in=@empty}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) 01:37:04 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:37:04 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x13}) 01:37:04 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x181800, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000180), 0x8000000000000000, 0x200040) socket$inet6(0xa, 0x80000, 0x6) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) getpeername$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c) socket(0x1e, 0x800, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@initdev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private0}}}, &(0x7f0000000280)=0xffffffffffffff34) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000340)={'ip6gre0\x00', &(0x7f00000002c0)={'ip6_vti0\x00', r4, 0x4, 0x4, 0x3, 0x7, 0x4, @private2, @private0, 0x8000, 0x7, 0x8000}}) r5 = accept(0xffffffffffffffff, &(0x7f0000000000)=@caif=@dgm, &(0x7f0000000080)=0x80) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22, 0xffffffff, @loopback, 0xa66e}, 0x1c) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f0000000240)) 01:37:04 executing program 0: unshare(0x0) unshare(0x12040100) unshare(0x20000400) 01:37:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x40eb02, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 0: unshare(0x6c060200) unshare(0x40000000) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='XV\x00\x00', @ANYRES16=0x0, @ANYBLOB="010028bd7000fddbdf2504000000080003000800000024000180060005004e20000008000300e0000001060001000a0000000800060005000000080002000000000008000300030000000800020004000000"], 0x58}, 0x1, 0x0, 0x0, 0x20000841}, 0x825) 01:37:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:04 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) [ 919.539518][T20869] FAULT_INJECTION: forcing a failure. [ 919.539518][T20869] name failslab, interval 1, probability 0, space 0, times 0 [ 919.552237][T20869] CPU: 1 PID: 20869 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 919.561033][T20869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.571459][T20869] Call Trace: [ 919.574742][T20869] dump_stack+0x137/0x19d [ 919.579109][T20869] should_fail+0x23c/0x250 [ 919.583543][T20869] ? sock_alloc_inode+0x23/0x90 [ 919.588509][T20869] __should_failslab+0x81/0x90 [ 919.593373][T20869] ? sockfs_init_fs_context+0x70/0x70 [ 919.598767][T20869] should_failslab+0x5/0x20 [ 919.598789][T20869] kmem_cache_alloc+0x46/0x2f0 [ 919.608194][T20869] ? selinux_socket_create+0x7c/0x170 [ 919.613683][T20869] ? sockfs_init_fs_context+0x70/0x70 [ 919.619127][T20869] sock_alloc_inode+0x23/0x90 [ 919.623900][T20869] ? sockfs_init_fs_context+0x70/0x70 [ 919.629309][T20869] new_inode_pseudo+0x38/0x1c0 [ 919.634133][T20869] sock_create_lite+0x72/0x280 [ 919.638952][T20869] __netlink_kernel_create+0x9c/0x5e0 [ 919.644426][T20869] ? __netlink_kernel_create+0x5ce/0x5e0 [ 919.650163][T20869] genl_pernet_init+0x4d/0xc0 [ 919.654879][T20869] ? genl_pernet_exit+0x40/0x40 [ 919.660091][T20869] ? genl_rcv+0x40/0x40 [ 919.664276][T20869] ops_init+0x1e7/0x230 [ 919.668463][T20869] ? setup_net+0x79/0x700 [ 919.673239][T20869] setup_net+0x1cb/0x700 [ 919.677607][T20869] copy_net_ns+0x2a9/0x450 [ 919.682066][T20869] create_new_namespaces+0x231/0x560 [ 919.687495][T20869] unshare_nsproxy_namespaces+0xe2/0x120 [ 919.693191][T20869] ksys_unshare+0x381/0x710 [ 919.697788][T20869] __x64_sys_unshare+0x1b/0x20 [ 919.702617][T20869] do_syscall_64+0x4a/0x90 [ 919.707045][T20869] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 919.713082][T20869] RIP: 0033:0x4665d9 [ 919.717187][T20869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 919.737182][T20869] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 919.745617][T20869] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 919.745634][T20869] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 919.745646][T20869] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 919.769602][T20869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 919.777597][T20869] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:05 executing program 3 (fault-call:1 fault-nth:21): unshare(0x6c020200) unshare(0x40000200) 01:37:05 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x900}) 01:37:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:05 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) syz_open_dev$rtc(&(0x7f0000000080), 0x51c, 0x40) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000040)) 01:37:05 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@mcast1, @mcast2, @private2, 0x0, 0x100, 0xfff, 0xd00, 0x0, 0x200}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000240)) 01:37:05 executing program 0: unshare(0x6c020200) unshare(0x20000400) unshare(0x10800) [ 919.882706][T20939] FAULT_INJECTION: forcing a failure. [ 919.882706][T20939] name failslab, interval 1, probability 0, space 0, times 0 [ 919.895415][T20939] CPU: 1 PID: 20939 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 919.904184][T20939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.914254][T20939] Call Trace: [ 919.917632][T20939] dump_stack+0x137/0x19d [ 919.922004][T20939] should_fail+0x23c/0x250 [ 919.926463][T20939] ? security_inode_alloc+0x30/0x180 [ 919.931866][T20939] __should_failslab+0x81/0x90 [ 919.937257][T20939] should_failslab+0x5/0x20 [ 919.941868][T20939] kmem_cache_alloc+0x46/0x2f0 [ 919.946681][T20939] security_inode_alloc+0x30/0x180 [ 919.951804][T20939] inode_init_always+0x20b/0x420 [ 919.956914][T20939] ? sockfs_init_fs_context+0x70/0x70 [ 919.962362][T20939] new_inode_pseudo+0x73/0x1c0 [ 919.967191][T20939] sock_create_lite+0x72/0x280 [ 919.972007][T20939] __netlink_kernel_create+0x9c/0x5e0 [ 919.977475][T20939] ? __netlink_kernel_create+0x5ce/0x5e0 01:37:05 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r1 = syz_open_dev$rtc(&(0x7f0000000080), 0xffefffffffffff00, 0x480c00) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x60002, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) 01:37:05 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x1100}) 01:37:05 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000100)={0x400, {{0xa, 0x4e24, 0xdd, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}}, 0x1, 0x8, [{{0xa, 0x4e24, 0x1, @empty, 0x7}}, {{0xa, 0x4e22, 0x32, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}}, {{0xa, 0x4e20, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}}, {{0xa, 0x4e23, 0x8000, @empty, 0x7f}}, {{0xa, 0x4e21, 0xfff, @mcast2, 0x1}}, {{0xa, 0x4e21, 0x6, @remote, 0x6}}, {{0xa, 0x4e24, 0x3f, @mcast1}}, {{0xa, 0x4e21, 0x530, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x7fff}}]}, 0x490) r2 = accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) setsockopt$inet6_buf(r2, 0x29, 0x45, &(0x7f00000005c0)="22738866deeab6b62c0c8a8e86bb5bfe9ee9c9", 0x13) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) 01:37:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:05 executing program 1: ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:37:05 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x7f775da4c03f531e}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r1, 0xa08, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}]}, 0x64}}, 0x800) [ 919.983123][T20939] genl_pernet_init+0x4d/0xc0 [ 919.987826][T20939] ? genl_pernet_exit+0x40/0x40 [ 919.992777][T20939] ? genl_rcv+0x40/0x40 [ 919.997036][T20939] ops_init+0x1e7/0x230 [ 920.001260][T20939] ? setup_net+0x79/0x700 [ 920.005697][T20939] setup_net+0x1cb/0x700 [ 920.009968][T20939] copy_net_ns+0x2a9/0x450 [ 920.014396][T20939] create_new_namespaces+0x231/0x560 [ 920.019771][T20939] unshare_nsproxy_namespaces+0xe2/0x120 [ 920.025497][T20939] ksys_unshare+0x381/0x710 [ 920.030229][T20939] __x64_sys_unshare+0x1b/0x20 [ 920.035088][T20939] do_syscall_64+0x4a/0x90 [ 920.039726][T20939] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 920.045846][T20939] RIP: 0033:0x4665d9 [ 920.050090][T20939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.070825][T20939] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 920.079353][T20939] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 920.087551][T20939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 920.096307][T20939] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.104721][T20939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.112830][T20939] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:05 executing program 3 (fault-call:1 fault-nth:22): unshare(0x6c020200) unshare(0x40000200) 01:37:05 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) io_setup(0x6, &(0x7f0000000c80)=0x0) io_getevents(r1, 0x10000, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/hid', 0x44182, 0x120) r5 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r5, 0x0, 0x0) r6 = syz_open_dev$vcsa(&(0x7f0000001300), 0x3, 0x8500) io_submit(r1, 0x3, &(0x7f0000001380)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x96744bf9825dddb, 0x7, r2, &(0x7f0000000100)="3a67167b1bb13476836c48e01fb4f04141b4e7ec5aa2ec3afecbb182f9074c01d8e91ae961cf4b1502e183af90ae05ec72dc569c5f8e5254f994082b430ed9cf731e364056dc66dc2fdabde084638e0f1d0ad656c581fa147f8bbe785703ecdd83fc097526c1a6e8e98fbc8679db513d43310ed2bebe8e7c662d2a9073d67a82f5c52a574f4dcdaa1d803e2316ef889749496cb74ca187239c2017d1ea19ce462e83a775a9c24ff1346ab9b81a20580f326aa6f421b5d688ac9d79ea939d2952d899222762c171eea996c508ba30910e0e16b107762ef390daaf58ab4cb313c5b9fc0e4ed4e432442382dca609184d10a0f09ecded3e", 0xf6, 0xfffffffffffffffb, 0x0, 0x3}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x0, r3, &(0x7f0000000280)="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", 0x1000, 0x7ff, 0x0, 0x3, r4}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x8, 0x5b00, r5, &(0x7f0000001280)="60e1097a6996ff6b119b24c0f02885c2cca0aa433a5d8d9c1f65c17a6bc4e8c6e5c9c03250024d4a8c143d44efbfed28282c110372e065820d0cf5919f6fbfe4314934fc584d9bcba90d167ee17cc3ccbdebb8d061629d99c07ab77420c85086e8c845f0352af605ebd743ab3df07fe601a70e84bd", 0x75, 0x400, 0x0, 0x1, r6}]) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:37:05 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000040)) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)={0x2a, 0xe, 0x16, 0xe, 0x3, 0x7, 0x1, 0xd2}) 01:37:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:05 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x1300}) 01:37:05 executing program 0: unshare(0x6c020200) unshare(0x20000400) syz_open_dev$vcsa(&(0x7f0000000000), 0x3, 0x12000) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x5, 0x1) getsockname$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x1c) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/irq', 0x24200, 0xcc) 01:37:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:37:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) [ 920.231378][T20995] FAULT_INJECTION: forcing a failure. [ 920.231378][T20995] name failslab, interval 1, probability 0, space 0, times 0 [ 920.244176][T20995] CPU: 1 PID: 20995 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 920.244195][T20995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.244203][T20995] Call Trace: [ 920.244210][T20995] dump_stack+0x137/0x19d [ 920.270759][T20995] should_fail+0x23c/0x250 [ 920.270784][T20995] ? sk_prot_alloc+0xb8/0x190 01:37:05 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x4000}) 01:37:05 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:37:05 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x1000000}) [ 920.270803][T20995] __should_failslab+0x81/0x90 [ 920.270897][T20995] should_failslab+0x5/0x20 [ 920.270913][T20995] __kmalloc+0x66/0x340 [ 920.293443][T20995] sk_prot_alloc+0xb8/0x190 [ 920.293471][T20995] sk_alloc+0x2e/0x220 [ 920.293489][T20995] __netlink_kernel_create+0xf4/0x5e0 01:37:05 executing program 2: unshare(0x6c060200) unshare(0x40000000) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='XV\x00\x00', @ANYRES16=0x0, @ANYBLOB="010028bd7000fddbdf2504000000080003000800000024000180060005004e20000008000300e0000001060001000a0000000800060005000000080002000000000008000300030000000800020004000000"], 0x58}, 0x1, 0x0, 0x0, 0x20000841}, 0x825) [ 920.293512][T20995] ? __netlink_kernel_create+0x5ce/0x5e0 [ 920.293532][T20995] genl_pernet_init+0x4d/0xc0 [ 920.293582][T20995] ? genl_pernet_exit+0x40/0x40 [ 920.293651][T20995] ? genl_rcv+0x40/0x40 [ 920.293665][T20995] ops_init+0x1e7/0x230 [ 920.293682][T20995] ? setup_net+0x79/0x700 [ 920.293701][T20995] setup_net+0x1cb/0x700 [ 920.293793][T20995] copy_net_ns+0x2a9/0x450 [ 920.293812][T20995] create_new_namespaces+0x231/0x560 [ 920.293832][T20995] unshare_nsproxy_namespaces+0xe2/0x120 [ 920.293918][T20995] ksys_unshare+0x381/0x710 01:37:05 executing program 3 (fault-call:1 fault-nth:23): unshare(0x6c020200) unshare(0x40000200) 01:37:05 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x9000000}) [ 920.293931][T20995] __x64_sys_unshare+0x1b/0x20 [ 920.294043][T20995] do_syscall_64+0x4a/0x90 [ 920.294063][T20995] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 920.294087][T20995] RIP: 0033:0x4665d9 [ 920.294101][T20995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.294165][T20995] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 920.294179][T20995] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 920.294191][T20995] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 920.294203][T20995] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.294216][T20995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.294228][T20995] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 920.503276][T21052] FAULT_INJECTION: forcing a failure. [ 920.503276][T21052] name failslab, interval 1, probability 0, space 0, times 0 [ 920.503296][T21052] CPU: 1 PID: 21052 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 920.503321][T21052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.503384][T21052] Call Trace: [ 920.503389][T21052] dump_stack+0x137/0x19d [ 920.503408][T21052] should_fail+0x23c/0x250 [ 920.503422][T21052] __should_failslab+0x81/0x90 [ 920.503440][T21052] ? selinux_sk_alloc_security+0x70/0xf0 [ 920.503457][T21052] should_failslab+0x5/0x20 [ 920.503473][T21052] kmem_cache_alloc_trace+0x49/0x310 [ 920.503495][T21052] ? sk_prot_alloc+0xb8/0x190 [ 920.503509][T21052] selinux_sk_alloc_security+0x70/0xf0 [ 920.503529][T21052] security_sk_alloc+0x45/0x90 [ 920.503546][T21052] sk_prot_alloc+0xd2/0x190 [ 920.503560][T21052] sk_alloc+0x2e/0x220 [ 920.503574][T21052] __netlink_kernel_create+0xf4/0x5e0 [ 920.503593][T21052] ? __netlink_kernel_create+0x5ce/0x5e0 [ 920.503612][T21052] genl_pernet_init+0x4d/0xc0 [ 920.503631][T21052] ? genl_pernet_exit+0x40/0x40 [ 920.503728][T21052] ? genl_rcv+0x40/0x40 [ 920.503743][T21052] ops_init+0x1e7/0x230 [ 920.503759][T21052] ? setup_net+0x79/0x700 [ 920.503774][T21052] setup_net+0x1cb/0x700 [ 920.503792][T21052] copy_net_ns+0x2a9/0x450 [ 920.503838][T21052] create_new_namespaces+0x231/0x560 [ 920.503857][T21052] unshare_nsproxy_namespaces+0xe2/0x120 [ 920.503880][T21052] ksys_unshare+0x381/0x710 [ 920.503897][T21052] __x64_sys_unshare+0x1b/0x20 [ 920.503914][T21052] do_syscall_64+0x4a/0x90 [ 920.503947][T21052] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 920.504011][T21052] RIP: 0033:0x4665d9 [ 920.504024][T21052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.504046][T21052] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 920.504130][T21052] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 920.504139][T21052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 01:37:06 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000080)=0x80, 0x1800) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:06 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000000)) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x1) 01:37:06 executing program 2: unshare(0x6c060200) unshare(0x40000000) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='XV\x00\x00', @ANYRES16=0x0, @ANYBLOB="010028bd7000fddbdf2504000000080003000800000024000180060005004e20000008000300e0000001060001000a0000000800060005000000080002000000000008000300030000000800020004000000"], 0x58}, 0x1, 0x0, 0x0, 0x20000841}, 0x825) 01:37:06 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x11000000}) 01:37:06 executing program 3 (fault-call:1 fault-nth:24): unshare(0x6c020200) unshare(0x40000200) 01:37:06 executing program 0: unshare(0x6c020200) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x36ae18ae8407c94f}, 0x4000) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x7c, r2, 0x30, 0x70bd27, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x3c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0xfd}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010101}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}]}, 0x7c}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) unshare(0x20000400) [ 920.504154][T21052] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.504164][T21052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.504172][T21052] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:06 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 01:37:06 executing program 1: r0 = getpid() ptrace$setopts(0x4206, r0, 0x202, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000240)) [ 920.875481][T21070] FAULT_INJECTION: forcing a failure. [ 920.875481][T21070] name failslab, interval 1, probability 0, space 0, times 0 [ 920.888253][T21070] CPU: 1 PID: 21070 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 920.897323][T21070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.907572][T21070] Call Trace: [ 920.910886][T21070] dump_stack+0x137/0x19d [ 920.915270][T21070] should_fail+0x23c/0x250 [ 920.919749][T21070] ? kzalloc+0x1d/0x30 01:37:06 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000000)={0x0, 0x27, 0xb, 0x6, 0x1, 0x8000, 0x1, 0x200169}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c0000fafa53cc5c00", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fedbdf2505000000080002000700000008000200050000000800030002000000"], 0x2c}}, 0x4010) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) [ 920.923945][T21070] __should_failslab+0x81/0x90 [ 920.928795][T21070] should_failslab+0x5/0x20 [ 920.933379][T21070] __kmalloc+0x66/0x340 [ 920.942586][T21070] ? sk_prot_alloc+0x125/0x190 [ 920.947511][T21070] ? init_timer_key+0x72/0x100 [ 920.952322][T21070] kzalloc+0x1d/0x30 [ 920.956315][T21070] __netlink_kernel_create+0x22d/0x5e0 [ 920.961792][T21070] ? __netlink_kernel_create+0x5ce/0x5e0 [ 920.967469][T21070] genl_pernet_init+0x4d/0xc0 01:37:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x571001) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000080)) 01:37:06 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x13000000}) [ 920.972189][T21070] ? genl_pernet_exit+0x40/0x40 [ 920.977069][T21070] ? genl_rcv+0x40/0x40 [ 920.981530][T21070] ops_init+0x1e7/0x230 [ 920.981561][T21070] ? setup_net+0x79/0x700 01:37:06 executing program 2: unshare(0x6c020200) unshare(0x20000400) syz_open_dev$vcsa(&(0x7f0000000000), 0x3, 0x12000) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x5, 0x1) getsockname$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x1c) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/irq', 0x24200, 0xcc) [ 920.981579][T21070] setup_net+0x1cb/0x700 [ 920.981622][T21070] copy_net_ns+0x2a9/0x450 [ 920.981672][T21070] create_new_namespaces+0x231/0x560 01:37:06 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000001a80)=0xe8) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000001b00)={0x0, @can={0x1d, r0}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ethernet={0x0, @dev}, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x9}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@dev={0xfe, 0x80, '\x00', 0x3a}, 0x47, r0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in=@multicast2, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) unshare(0x6c020200) unshare(0x20000400) 01:37:06 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x40000000}) 01:37:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x1, 0x70bd28, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20040050}, 0x24000001) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000000)) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) [ 920.981691][T21070] unshare_nsproxy_namespaces+0xe2/0x120 [ 920.981709][T21070] ksys_unshare+0x381/0x710 01:37:06 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0xc4ffffff}) [ 920.981724][T21070] __x64_sys_unshare+0x1b/0x20 [ 920.981820][T21070] do_syscall_64+0x4a/0x90 [ 920.981840][T21070] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 920.981862][T21070] RIP: 0033:0x4665d9 01:37:06 executing program 3 (fault-call:1 fault-nth:25): unshare(0x6c020200) unshare(0x40000200) 01:37:06 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0xf8ffffff}) [ 920.981873][T21070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 920.981885][T21070] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 01:37:06 executing program 0: r0 = accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x0, 0x0) r2 = gettid() ptrace$pokeuser(0x6, r2, 0x0, 0x0) rt_tgsigqueueinfo(r1, r2, 0x4026, &(0x7f0000000140)={0x800029, 0x3, 0x2075}) unshare(0x6c020200) unshare(0x18060900) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@loopback, @in6=@initdev}}, {{@in6=@dev}}}, &(0x7f0000000400)=0xe8) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x38, 0x0, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3005}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0xc050}, 0x10) 01:37:06 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0xfaffffff}) [ 920.981900][T21070] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 920.981909][T21070] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 920.981918][T21070] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 920.981947][T21070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.981958][T21070] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 921.277218][T21164] FAULT_INJECTION: forcing a failure. [ 921.277218][T21164] name failslab, interval 1, probability 0, space 0, times 0 [ 921.277237][T21164] CPU: 0 PID: 21164 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 921.277330][T21164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.277338][T21164] Call Trace: [ 921.277343][T21164] dump_stack+0x137/0x19d [ 921.277362][T21164] should_fail+0x23c/0x250 [ 921.277377][T21164] ? kzalloc+0x16/0x20 [ 921.277403][T21164] __should_failslab+0x81/0x90 [ 921.277426][T21164] should_failslab+0x5/0x20 [ 921.277441][T21164] __kmalloc+0x66/0x340 [ 921.277459][T21164] ? genl_pernet_init+0x6f/0xc0 [ 921.277501][T21164] ? genl_pernet_exit+0x40/0x40 [ 921.277518][T21164] kzalloc+0x16/0x20 [ 921.277537][T21164] ops_init+0x58/0x230 [ 921.371990][T21164] ? setup_net+0x79/0x700 [ 921.372013][T21164] setup_net+0x1cb/0x700 [ 921.372057][T21164] copy_net_ns+0x2a9/0x450 [ 921.372072][T21164] create_new_namespaces+0x231/0x560 [ 921.372190][T21164] unshare_nsproxy_namespaces+0xe2/0x120 [ 921.372280][T21164] ksys_unshare+0x381/0x710 [ 921.372293][T21164] __x64_sys_unshare+0x1b/0x20 [ 921.372306][T21164] do_syscall_64+0x4a/0x90 [ 921.372322][T21164] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 921.372340][T21164] RIP: 0033:0x4665d9 [ 921.372351][T21164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 921.372363][T21164] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 921.372429][T21164] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 01:37:06 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) r1 = syz_open_dev$rtc(&(0x7f0000000000), 0xffffffffffff82d8, 0x28040) ioctl$RTC_WIE_ON(r1, 0x700f) 01:37:06 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000040), 0x3, 0x10040) ioctl$RTC_WIE_ON(r0, 0x700f) unshare(0x66020b00) unshare(0x20000400) ustat(0x7f, &(0x7f0000000080)) 01:37:06 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0xffffffc4}) 01:37:06 executing program 2: unshare(0x6c020200) unshare(0x20000400) syz_open_dev$vcsa(&(0x7f0000000000), 0x3, 0x12000) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x5, 0x1) getsockname$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000040)=0x1c) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/irq', 0x24200, 0xcc) 01:37:06 executing program 3 (fault-call:1 fault-nth:26): unshare(0x6c020200) unshare(0x40000200) 01:37:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_WIE_ON(r0, 0x700f) [ 921.372438][T21164] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 921.372446][T21164] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 921.372455][T21164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 921.372463][T21164] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:06 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0xfffffff8}) 01:37:06 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) ioctl$RTC_WIE_ON(r0, 0x700f) 01:37:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x80500, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:07 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0xfffffffa}) 01:37:07 executing program 0: unshare(0x60061300) [ 921.603561][T21210] FAULT_INJECTION: forcing a failure. [ 921.603561][T21210] name failslab, interval 1, probability 0, space 0, times 0 [ 921.620696][T21210] CPU: 0 PID: 21210 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 921.629576][T21210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 921.640130][T21210] Call Trace: [ 921.643726][T21210] dump_stack+0x137/0x19d [ 921.648231][T21210] should_fail+0x23c/0x250 01:37:07 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:37:07 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)={'filter\x00', 0x0, [0x5, 0x6, 0x1, 0xfffffffb, 0xfffff294]}, &(0x7f0000000080)=0x54) [ 921.652659][T21210] ? sock_alloc_inode+0x23/0x90 [ 921.657527][T21210] __should_failslab+0x81/0x90 [ 921.662340][T21210] ? sockfs_init_fs_context+0x70/0x70 [ 921.667737][T21210] should_failslab+0x5/0x20 [ 921.672326][T21210] kmem_cache_alloc+0x46/0x2f0 [ 921.677290][T21210] ? selinux_socket_create+0x7c/0x170 [ 921.682795][T21210] ? sockfs_init_fs_context+0x70/0x70 [ 921.688175][T21210] sock_alloc_inode+0x23/0x90 [ 921.693001][T21210] ? sockfs_init_fs_context+0x70/0x70 [ 921.698383][T21210] new_inode_pseudo+0x38/0x1c0 01:37:07 executing program 0: unshare(0x6c020200) unshare(0x20010a00) [ 921.703177][T21210] sock_create_lite+0x72/0x280 [ 921.707961][T21210] __netlink_kernel_create+0x9c/0x5e0 [ 921.713561][T21210] ? kzalloc+0x16/0x20 [ 921.717633][T21210] audit_net_init+0x87/0x180 [ 921.722225][T21210] ? audit_net_exit+0x60/0x60 [ 921.726908][T21210] ? audit_receive+0x25d0/0x25d0 [ 921.731897][T21210] ? audit_multicast_bind+0x30/0x30 [ 921.737317][T21210] ops_init+0x1e7/0x230 [ 921.741488][T21210] ? setup_net+0x79/0x700 [ 921.745884][T21210] setup_net+0x1cb/0x700 01:37:07 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x220100, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) [ 921.750407][T21210] copy_net_ns+0x2a9/0x450 [ 921.754838][T21210] create_new_namespaces+0x231/0x560 [ 921.760272][T21210] unshare_nsproxy_namespaces+0xe2/0x120 [ 921.766171][T21210] ksys_unshare+0x381/0x710 [ 921.770769][T21210] __x64_sys_unshare+0x1b/0x20 [ 921.775588][T21210] do_syscall_64+0x4a/0x90 [ 921.780008][T21210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 921.785950][T21210] RIP: 0033:0x4665d9 [ 921.789847][T21210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 921.809879][T21210] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 921.818301][T21210] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 921.826331][T21210] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 921.834435][T21210] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 921.842615][T21210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 01:37:07 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x1, 0x70bd28, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x20040050}, 0x24000001) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000000)) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) [ 921.851039][T21210] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 921.859138][T21210] audit: cannot initialize netlink socket in namespace 01:37:07 executing program 3 (fault-call:1 fault-nth:27): unshare(0x6c020200) unshare(0x40000200) 01:37:07 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)) 01:37:07 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x2002, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000140)={0x0, 0x0, {0x19, 0x7, 0x12, 0x8, 0x3, 0x4, 0x5, 0xd, 0x8000000000000000}}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) getsockname$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x1c) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) 01:37:07 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) 01:37:07 executing program 0: unshare(0x6c020200) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/nf_conntrack', 0x40000, 0x19e) ioctl$RTC_VL_CLR(r0, 0x7014) unshare(0x20000400) syz_open_dev$rtc(&(0x7f0000000040), 0x9, 0x511281) 01:37:07 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:07 executing program 2: unshare(0x6c020200) unshare(0x20000400) r0 = socket(0x11, 0x3, 0x7fff) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) accept$inet6(r0, 0x0, &(0x7f0000000000)) 01:37:07 executing program 0: unshare(0x6c020200) unshare(0x20000400) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x4) 01:37:07 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x9}) [ 922.014779][T21281] FAULT_INJECTION: forcing a failure. [ 922.014779][T21281] name failslab, interval 1, probability 0, space 0, times 0 [ 922.028018][T21281] CPU: 1 PID: 21281 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 922.037444][T21281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.047663][T21281] Call Trace: [ 922.050930][T21281] dump_stack+0x137/0x19d [ 922.055269][T21281] should_fail+0x23c/0x250 [ 922.059875][T21281] ? security_inode_alloc+0x30/0x180 [ 922.065168][T21281] __should_failslab+0x81/0x90 [ 922.070893][T21281] should_failslab+0x5/0x20 [ 922.075386][T21281] kmem_cache_alloc+0x46/0x2f0 [ 922.080291][T21281] security_inode_alloc+0x30/0x180 [ 922.085471][T21281] inode_init_always+0x20b/0x420 [ 922.090394][T21281] ? sockfs_init_fs_context+0x70/0x70 [ 922.095756][T21281] new_inode_pseudo+0x73/0x1c0 [ 922.100640][T21281] sock_create_lite+0x72/0x280 [ 922.106375][T21281] __netlink_kernel_create+0x9c/0x5e0 [ 922.111744][T21281] ? kzalloc+0x16/0x20 [ 922.115977][T21281] audit_net_init+0x87/0x180 [ 922.120592][T21281] ? audit_net_exit+0x60/0x60 [ 922.125569][T21281] ? audit_receive+0x25d0/0x25d0 [ 922.130595][T21281] ? audit_multicast_bind+0x30/0x30 [ 922.135811][T21281] ops_init+0x1e7/0x230 [ 922.139959][T21281] ? setup_net+0x79/0x700 [ 922.144298][T21281] setup_net+0x1cb/0x700 [ 922.148541][T21281] copy_net_ns+0x2a9/0x450 [ 922.152946][T21281] create_new_namespaces+0x231/0x560 [ 922.158234][T21281] unshare_nsproxy_namespaces+0xe2/0x120 [ 922.163857][T21281] ksys_unshare+0x381/0x710 [ 922.168358][T21281] __x64_sys_unshare+0x1b/0x20 [ 922.173118][T21281] do_syscall_64+0x4a/0x90 [ 922.177631][T21281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 922.183623][T21281] RIP: 0033:0x4665d9 [ 922.187528][T21281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.207195][T21281] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 01:37:07 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:37:07 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x141400, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'sit0\x00', 0x0, 0x2f, 0x1f, 0x0, 0x6, 0x49, @local, @private0, 0x7800, 0x8000, 0x6, 0x56}}) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x84800) ioctl$sock_SIOCDELRT(r2, 0x890c, &(0x7f0000000240)={0x0, @generic={0x3, "0db46278e1a0c643785390e5ef49"}, @phonet={0x23, 0xb6, 0x1, 0x1}, @llc={0x1a, 0xfffe, 0xa6, 0x74, 0x80, 0xd8}, 0x8, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000200)='wg2\x00', 0x2, 0x9, 0x8000}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000100)={'syztnl0\x00', r1, 0x4, 0x1, 0x7f, 0x3, 0x18, @ipv4={'\x00', '\xff\xff', @multicast2}, @remote, 0x7800, 0x7, 0x0, 0x8000}}) [ 922.215597][T21281] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 922.223903][T21281] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 922.231861][T21281] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 922.239934][T21281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 922.247936][T21281] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 922.256012][T21281] audit: cannot initialize netlink socket in namespace 01:37:07 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x11}) 01:37:07 executing program 3 (fault-call:1 fault-nth:28): unshare(0x6c020200) unshare(0x40000200) 01:37:07 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/pnp0', 0x20300, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), r1) 01:37:07 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000100)={0x10001, 0x1000, "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"}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x4080, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x1a, 0x38, 0xf, 0x2, 0x5, 0x7fff, 0x2, 0xa5}) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000001140)={{0xa, 0x4e21, 0x8000, @dev={0xfe, 0x80, '\x00', 0x43}, 0x4}, {0xa, 0x4e23, 0x1, @mcast2, 0x9}, 0x8001, [0x3f, 0x8773, 0x81, 0x1, 0x8, 0xc0b, 0x4, 0x5]}, 0x5c) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000001280)={'ip6gre0\x00', &(0x7f0000001200)={'ip6tnl0\x00', 0x0, 0x4, 0x9c, 0x3, 0x10000, 0x0, @private2, @private1, 0x7, 0x10, 0x1, 0x7ff}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000001340)={'syztnl0\x00', &(0x7f00000012c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0x2, 0x1ff, 0x13, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8000, 0x8000, 0x3, 0x8}}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f0000000080)=""/29, &(0x7f00000011c0)=0x1d) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:07 executing program 2: unshare(0x6c020200) unshare(0x20000400) r0 = socket(0x11, 0x3, 0x7fff) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) accept$inet6(r0, 0x0, &(0x7f0000000000)) 01:37:07 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x13}) 01:37:07 executing program 0: unshare(0x6c020200) unshare(0x20000400) unshare(0x40200) 01:37:07 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000300)={@empty}, 0x14) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_open_dev$rtc(&(0x7f0000000000), 0x7, 0x101000) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000040)) ioctl$RTC_UIE_ON(r2, 0x7003) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000180)={{{@in=@local, @in6=@initdev}}, {{@in6=@initdev}, 0x0, @in6=@private2}}, &(0x7f0000000280)=0xe8) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) 01:37:07 executing program 4: prctl$PR_SET_SECUREBITS(0x1c, 0x30) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000100)={0xfff, {{0xa, 0xfffc, 0xffffffff, @mcast2, 0xffffffff}}, 0x0, 0x4, [{{0xa, 0x4e24, 0xfff, @local, 0x20}}, {{0xa, 0x4e21, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x2}}, {{0xa, 0x4e22, 0x40, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}}, {{0xa, 0x4e23, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2}}]}, 0x290) ioctl$RTC_UIE_ON(r0, 0x7003) [ 922.513014][T21347] FAULT_INJECTION: forcing a failure. [ 922.513014][T21347] name failslab, interval 1, probability 0, space 0, times 0 [ 922.525859][T21347] CPU: 1 PID: 21347 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 922.535538][T21347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.545666][T21347] Call Trace: [ 922.548953][T21347] dump_stack+0x137/0x19d [ 922.553291][T21347] should_fail+0x23c/0x250 [ 922.557946][T21347] ? sk_prot_alloc+0xb8/0x190 [ 922.562724][T21347] __should_failslab+0x81/0x90 [ 922.567590][T21347] should_failslab+0x5/0x20 [ 922.572129][T21347] __kmalloc+0x66/0x340 [ 922.576337][T21347] sk_prot_alloc+0xb8/0x190 [ 922.576365][T21347] sk_alloc+0x2e/0x220 [ 922.576384][T21347] __netlink_kernel_create+0xf4/0x5e0 [ 922.576457][T21347] ? kzalloc+0x16/0x20 [ 922.576473][T21347] audit_net_init+0x87/0x180 [ 922.576489][T21347] ? audit_net_exit+0x60/0x60 [ 922.576509][T21347] ? audit_receive+0x25d0/0x25d0 [ 922.608675][T21347] ? audit_multicast_bind+0x30/0x30 [ 922.608701][T21347] ops_init+0x1e7/0x230 [ 922.608728][T21347] ? setup_net+0x79/0x700 [ 922.608744][T21347] setup_net+0x1cb/0x700 [ 922.608760][T21347] copy_net_ns+0x2a9/0x450 [ 922.631434][T21347] create_new_namespaces+0x231/0x560 [ 922.642019][T21347] unshare_nsproxy_namespaces+0xe2/0x120 [ 922.647968][T21347] ksys_unshare+0x381/0x710 [ 922.647994][T21347] __x64_sys_unshare+0x1b/0x20 [ 922.648012][T21347] do_syscall_64+0x4a/0x90 01:37:07 executing program 1: prctl$PR_SET_PDEATHSIG(0x1, 0x3e) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x4000d) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x0, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e24, 0xffffffff, @ipv4={'\x00', '\xff\xff', @broadcast}, 0xbb}, {0xa, 0x4e22, 0x1f, @private2={0xfc, 0x2, '\x00', 0x1}, 0xffffffff}, 0xd8d1, [0x6, 0x0, 0x0, 0x8, 0x7ff, 0x4, 0x6, 0x7]}, 0x5c) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) 01:37:07 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0xb, 0x26, 0x6, 0x1e, 0x4, 0x20, 0x0, 0x74, 0xffffffffffffffff}}) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x40000) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) ioctl$RTC_UIE_OFF(r3, 0x7004) 01:37:08 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x88182, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x6, 0x200402) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/cpuid', 0x3eb080, 0x4) r3 = syz_open_dev$rtc(&(0x7f0000000140), 0x7fff, 0x200) ioctl$RTC_WIE_OFF(r3, 0x7010) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000080)) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000040)) ioctl$RTC_WIE_OFF(r1, 0x7010) 01:37:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r2 = accept(r1, &(0x7f0000000240)=@generic, &(0x7f0000000300)=0x80) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000340)={0x9, {{0xa, 0x4e20, 0x10000, @ipv4={'\x00', '\xff\xff', @empty}, 0x6}}, 0x0, 0x7, [{{0xa, 0x4e24, 0x8000000, @remote, 0x101}}, {{0xa, 0x4e22, 0x3, @remote}}, {{0xa, 0x4e24, 0x2, @remote, 0x9}}, {{0xa, 0x4e24, 0x1000, @ipv4={'\x00', '\xff\xff', @empty}, 0x3}}, {{0xa, 0x4e23, 0x7, @loopback, 0x8}}, {{0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0xa6a}}, {{0xa, 0x4e22, 0x2, @empty, 0x3}}]}, 0x410) accept4(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000080)=0x80, 0x80000) syz_open_dev$vcsa(&(0x7f0000000100), 0x5, 0x800) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, &(0x7f0000000840)={0x67, 0xb, '\x00', [@ra={0x5, 0x2, 0xb140}, @calipso={0x7, 0x40, {0x0, 0xe, 0x81, 0xbe, [0x3, 0x0, 0xfd, 0xffffffffffffff01, 0x7fffffff, 0x8, 0xb1d]}}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @padn={0x1, 0x1, [0x0]}]}, 0x68) syz_open_dev$vcsn(&(0x7f0000000140), 0xfffffffffffffff7, 0x400040) accept(r1, &(0x7f0000000180)=@tipc=@id, &(0x7f0000000200)=0x80) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x5) ioctl$RTC_UIE_ON(r1, 0x7003) accept4(r2, &(0x7f0000000780)=@qipcrtr, &(0x7f0000000800)=0x80, 0x80000) ioctl$RTC_UIE_ON(r0, 0x7003) [ 922.661964][T21347] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 922.667890][T21347] RIP: 0033:0x4665d9 [ 922.671859][T21347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 922.691527][T21347] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 922.700115][T21347] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 922.708105][T21347] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 922.708123][T21347] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 922.708136][T21347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 922.708148][T21347] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 922.708227][T21347] audit: cannot initialize netlink socket in namespace 01:37:08 executing program 3 (fault-call:1 fault-nth:29): unshare(0x6c020200) unshare(0x40000200) 01:37:08 executing program 0: unshare(0x20100) r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) sched_rr_get_interval(r0, &(0x7f0000000000)) unshare(0x20000400) 01:37:08 executing program 2: unshare(0x6c020200) unshare(0x20000400) r0 = socket(0x11, 0x3, 0x7fff) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) accept$inet6(r0, 0x0, &(0x7f0000000000)) 01:37:08 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x900}) 01:37:08 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) 01:37:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000000)) ioctl$RTC_UIE_ON(r0, 0x7003) [ 922.849398][T21400] FAULT_INJECTION: forcing a failure. [ 922.849398][T21400] name failslab, interval 1, probability 0, space 0, times 0 [ 922.862201][T21400] CPU: 1 PID: 21400 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 922.871038][T21400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 922.881334][T21400] Call Trace: [ 922.884646][T21400] dump_stack+0x137/0x19d [ 922.888989][T21400] should_fail+0x23c/0x250 [ 922.893416][T21400] __should_failslab+0x81/0x90 [ 922.898298][T21400] ? selinux_sk_alloc_security+0x70/0xf0 [ 922.904065][T21400] should_failslab+0x5/0x20 [ 922.908585][T21400] kmem_cache_alloc_trace+0x49/0x310 [ 922.913889][T21400] ? sk_prot_alloc+0xb8/0x190 [ 922.918617][T21400] selinux_sk_alloc_security+0x70/0xf0 [ 922.924135][T21400] security_sk_alloc+0x45/0x90 [ 922.928944][T21400] sk_prot_alloc+0xd2/0x190 [ 922.933465][T21400] sk_alloc+0x2e/0x220 [ 922.937582][T21400] __netlink_kernel_create+0xf4/0x5e0 [ 922.942972][T21400] ? kzalloc+0x16/0x20 01:37:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$rtc(&(0x7f0000000040), 0x10001, 0x402200) ioctl$RTC_VL_CLR(r1, 0x7014) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000080)) 01:37:08 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x1100}) 01:37:08 executing program 0: unshare(0x6c020200) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000000)) unshare(0x20000400) 01:37:08 executing program 1: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000240)) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@loopback, @in6=@empty, 0x4e20, 0xd3, 0x4e23, 0x1, 0x2, 0x80, 0x180, 0x5c, 0x0, 0xee01}, {0x890b, 0x3, 0x3, 0x4, 0x0, 0x7f, 0x1ff, 0x3f}, {0x401, 0x1, 0x800000000006, 0x2}, 0x2, 0x0, 0x2, 0x0, 0x3, 0x2}, {{@in6=@local, 0x4d2, 0x6c}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0x43}, 0x3, 0x1, 0x2, 0x5, 0x0, 0x8, 0x2}}, 0xe8) [ 922.947089][T21400] audit_net_init+0x87/0x180 [ 922.951808][T21400] ? audit_net_exit+0x60/0x60 [ 922.956534][T21400] ? audit_receive+0x25d0/0x25d0 [ 922.961741][T21400] ? audit_multicast_bind+0x30/0x30 [ 922.966949][T21400] ops_init+0x1e7/0x230 [ 922.971211][T21400] ? setup_net+0x79/0x700 [ 922.975573][T21400] setup_net+0x1cb/0x700 [ 922.979910][T21400] copy_net_ns+0x2a9/0x450 [ 922.984521][T21400] create_new_namespaces+0x231/0x560 [ 922.989821][T21400] unshare_nsproxy_namespaces+0xe2/0x120 [ 922.995668][T21400] ksys_unshare+0x381/0x710 01:37:08 executing program 4: r0 = gettid() ptrace$pokeuser(0x6, r0, 0x0, 0x0) r1 = getpgid(r0) r2 = gettid() ptrace$pokeuser(0x6, r2, 0x0, 0x0) tgkill(r2, r0, 0x30) getpgrp(r1) r3 = gettid() ptrace$pokeuser(0x6, r3, 0x0, 0x0) r4 = getpgid(r1) getpgid(r4) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r5, 0x7003) [ 923.000286][T21400] __x64_sys_unshare+0x1b/0x20 [ 923.005200][T21400] do_syscall_64+0x4a/0x90 [ 923.009621][T21400] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 923.015569][T21400] RIP: 0033:0x4665d9 [ 923.019555][T21400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 923.040516][T21400] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 01:37:08 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) [ 923.050351][T21400] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 923.058394][T21400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 923.066660][T21400] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 923.074718][T21400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 923.082876][T21400] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 923.091149][T21400] audit: cannot initialize netlink socket in namespace 01:37:08 executing program 3 (fault-call:1 fault-nth:30): unshare(0x6c020200) unshare(0x40000200) 01:37:08 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x1300}) 01:37:08 executing program 1: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000240)) 01:37:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x13, 0x34, 0xe, 0x16, 0x4, 0x3, 0x4, 0xa5}}) 01:37:08 executing program 2: unshare(0x6c020200) unshare(0x20000400) r0 = socket(0x11, 0x3, 0x7fff) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) 01:37:08 executing program 0: unshare(0x8000100) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x4, 0x30, 0x40, 0x298a, 0x38, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x1, 0x1, 0x8d, 0x847}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={@private1, @empty, @mcast2, 0x2, 0x352d, 0xffff, 0x400, 0x7f, 0x120001, r0}) unshare(0x20000400) 01:37:08 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_AIE_ON(r0, 0x7001) syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x20801) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x501280, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000140)) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0xffff, 0x3eda81) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x34, 0x12, 0x16, 0x17, 0x5, 0x2, 0x3, 0x144, 0xffffffffffffffff}}) 01:37:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000000)={0x20, 0x28, 0x10, 0x1c, 0x6, 0xa4d, 0x1, 0x96, 0xffffffffffffffff}) [ 923.237023][T21473] FAULT_INJECTION: forcing a failure. [ 923.237023][T21473] name failslab, interval 1, probability 0, space 0, times 0 [ 923.250014][T21473] CPU: 0 PID: 21473 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 923.259355][T21473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.269687][T21473] Call Trace: [ 923.273093][T21473] dump_stack+0x137/0x19d [ 923.278508][T21473] should_fail+0x23c/0x250 [ 923.283098][T21473] ? kzalloc+0x1d/0x30 01:37:08 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x4000}) 01:37:08 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) io_setup(0x6, &(0x7f0000000c80)=0x0) io_submit(r1, 0x0, 0x0) io_setup(0x10000, &(0x7f00000000c0)) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 01:37:08 executing program 0: unshare(0x6c020200) unshare(0x20000400) unshare(0x8000000) [ 923.287174][T21473] __should_failslab+0x81/0x90 [ 923.292093][T21473] should_failslab+0x5/0x20 [ 923.296607][T21473] __kmalloc+0x66/0x340 [ 923.301571][T21473] ? sk_prot_alloc+0x125/0x190 [ 923.306418][T21473] ? init_timer_key+0x72/0x100 [ 923.311316][T21473] kzalloc+0x1d/0x30 [ 923.315474][T21473] __netlink_kernel_create+0x22d/0x5e0 [ 923.321220][T21473] ? kzalloc+0x16/0x20 [ 923.325580][T21473] audit_net_init+0x87/0x180 [ 923.330297][T21473] ? audit_net_exit+0x60/0x60 01:37:08 executing program 4: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x1, 0x600040) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)={@local, 0x0}, &(0x7f0000000080)=0x14) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e24, 0x1, @private1, 0x9}, {0xa, 0x4e23, 0xff, @dev={0xfe, 0x80, '\x00', 0x2f}, 0x1}, 0x5, [0x80000001, 0x2, 0x10001, 0x7, 0x5, 0xffffffff, 0x6ad5, 0x40001]}, 0x5c) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@private1, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x258, 0x0, 0x1, 0x100, 0x5, 0x2500022, r1}) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'syztnl1\x00', r1, 0x29, 0x7, 0x1, 0x4, 0x2, @loopback, @empty, 0x700, 0x1, 0x7, 0x1}}) r2 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r2, 0x0, 0x0) accept(r2, &(0x7f0000000400)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1}}, &(0x7f0000000480)=0x80) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@private, @in6=@initdev}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x10) ioctl$RTC_UIE_ON(r3, 0x7003) [ 923.335074][T21473] ? audit_receive+0x25d0/0x25d0 [ 923.340029][T21473] ? audit_multicast_bind+0x30/0x30 [ 923.345623][T21473] ops_init+0x1e7/0x230 [ 923.349975][T21473] ? setup_net+0x79/0x700 [ 923.354424][T21473] setup_net+0x1cb/0x700 [ 923.358729][T21473] copy_net_ns+0x2a9/0x450 [ 923.363158][T21473] create_new_namespaces+0x231/0x560 [ 923.368478][T21473] unshare_nsproxy_namespaces+0xe2/0x120 [ 923.374167][T21473] ksys_unshare+0x381/0x710 [ 923.378810][T21473] __x64_sys_unshare+0x1b/0x20 [ 923.383666][T21473] do_syscall_64+0x4a/0x90 [ 923.388145][T21473] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 923.394163][T21473] RIP: 0033:0x4665d9 [ 923.398060][T21473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 923.417681][T21473] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 923.426203][T21473] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 923.434200][T21473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 923.442174][T21473] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 923.450149][T21473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 923.458154][T21473] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 [ 923.466507][T21473] audit: cannot initialize netlink socket in namespace 01:37:08 executing program 3 (fault-call:1 fault-nth:31): unshare(0x6c020200) unshare(0x40000200) 01:37:08 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x1000000}) 01:37:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, 0x0, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x3c}}, 0x40000004) 01:37:08 executing program 2: unshare(0x6c020200) unshare(0x20000400) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) 01:37:08 executing program 0: unshare(0x6c020200) unshare(0x20000400) ptrace$getenv(0x4201, 0x0, 0x2fc00000, &(0x7f0000000000)) 01:37:08 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) [ 923.626001][T21529] FAULT_INJECTION: forcing a failure. [ 923.626001][T21529] name failslab, interval 1, probability 0, space 0, times 0 [ 923.638789][T21529] CPU: 0 PID: 21529 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 923.647548][T21529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 923.657866][T21529] Call Trace: [ 923.661176][T21529] dump_stack+0x137/0x19d [ 923.665518][T21529] should_fail+0x23c/0x250 [ 923.669943][T21529] __should_failslab+0x81/0x90 [ 923.674730][T21529] ? uevent_net_init+0x55/0x1b0 [ 923.679648][T21529] should_failslab+0x5/0x20 [ 923.684140][T21529] kmem_cache_alloc_trace+0x49/0x310 [ 923.689417][T21529] uevent_net_init+0x55/0x1b0 [ 923.694084][T21529] ? uevent_net_exit+0x110/0x110 [ 923.699009][T21529] ops_init+0x1e7/0x230 [ 923.703154][T21529] ? setup_net+0x79/0x700 [ 923.707472][T21529] setup_net+0x1cb/0x700 [ 923.711942][T21529] copy_net_ns+0x2a9/0x450 [ 923.716439][T21529] create_new_namespaces+0x231/0x560 [ 923.722073][T21529] unshare_nsproxy_namespaces+0xe2/0x120 [ 923.727832][T21529] ksys_unshare+0x381/0x710 [ 923.732704][T21529] __x64_sys_unshare+0x1b/0x20 [ 923.737661][T21529] do_syscall_64+0x4a/0x90 [ 923.742149][T21529] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 923.748311][T21529] RIP: 0033:0x4665d9 [ 923.752252][T21529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:37:09 executing program 4: sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x80) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x420003, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:37:09 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 01:37:09 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x9000000}) [ 923.772035][T21529] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 923.780449][T21529] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 923.788517][T21529] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 923.796640][T21529] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 923.805188][T21529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 923.813230][T21529] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:09 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x264, 0x84000) r0 = syz_open_dev$rtc(&(0x7f0000000080), 0x8, 0x201) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000040)) 01:37:09 executing program 0: unshare(0x6c000680) unshare(0x20000400) 01:37:09 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0xa00, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x8, 0x98143) ioctl$RTC_AIE_OFF(r1, 0x7002) 01:37:09 executing program 3 (fault-call:1 fault-nth:32): unshare(0x6c020200) unshare(0x40000200) 01:37:09 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x11000000}) 01:37:09 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:37:09 executing program 2: unshare(0x6c020200) unshare(0x20000400) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) 01:37:09 executing program 0: unshare(0x41200) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@mcast2}, &(0x7f0000000080)=0x14) unshare(0x20000400) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000000c0)=0x4, 0x4) 01:37:09 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) [ 924.113797][T21588] FAULT_INJECTION: forcing a failure. [ 924.113797][T21588] name failslab, interval 1, probability 0, space 0, times 0 [ 924.126779][T21588] CPU: 0 PID: 21588 Comm: syz-executor.3 Not tainted 5.13.0-rc5-syzkaller #0 [ 924.135702][T21588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 924.145759][T21588] Call Trace: [ 924.149127][T21588] dump_stack+0x137/0x19d [ 924.153837][T21588] should_fail+0x23c/0x250 [ 924.158377][T21588] ? sock_alloc_inode+0x23/0x90 [ 924.163374][T21588] __should_failslab+0x81/0x90 [ 924.168338][T21588] ? sockfs_init_fs_context+0x70/0x70 [ 924.173752][T21588] should_failslab+0x5/0x20 [ 924.178276][T21588] kmem_cache_alloc+0x46/0x2f0 [ 924.183056][T21588] ? netlink_insert+0x649/0x7f0 [ 924.188115][T21588] ? selinux_socket_create+0x7c/0x170 [ 924.193554][T21588] ? sockfs_init_fs_context+0x70/0x70 [ 924.199123][T21588] sock_alloc_inode+0x23/0x90 [ 924.203911][T21588] ? sockfs_init_fs_context+0x70/0x70 [ 924.209270][T21588] new_inode_pseudo+0x38/0x1c0 [ 924.214171][T21588] sock_create_lite+0x72/0x280 [ 924.218924][T21588] __netlink_kernel_create+0x9c/0x5e0 [ 924.224289][T21588] ? uevent_net_init+0x55/0x1b0 [ 924.229132][T21588] uevent_net_init+0x6f/0x1b0 [ 924.233811][T21588] ? uevent_net_exit+0x110/0x110 [ 924.238839][T21588] ops_init+0x1e7/0x230 [ 924.242986][T21588] ? setup_net+0x79/0x700 [ 924.247301][T21588] setup_net+0x1cb/0x700 [ 924.251546][T21588] copy_net_ns+0x2a9/0x450 [ 924.255951][T21588] create_new_namespaces+0x231/0x560 [ 924.261246][T21588] unshare_nsproxy_namespaces+0xe2/0x120 [ 924.266931][T21588] ksys_unshare+0x381/0x710 [ 924.271514][T21588] __x64_sys_unshare+0x1b/0x20 [ 924.276277][T21588] do_syscall_64+0x4a/0x90 [ 924.280725][T21588] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 924.286611][T21588] RIP: 0033:0x4665d9 [ 924.290660][T21588] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 924.310275][T21588] RSP: 002b:00007f2bd7c4c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 924.318711][T21588] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 924.326707][T21588] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000200 [ 924.334666][T21588] RBP: 00007f2bd7c4c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 924.342800][T21588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 924.350761][T21588] R13: 00007ffeeed9066f R14: 00007f2bd7c4c300 R15: 0000000000022000 01:37:09 executing program 4: unshare(0x6c020200) unshare(0x20000400) unshare(0x8000000) 01:37:09 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x13000000}) 01:37:09 executing program 2: unshare(0x6c020200) unshare(0x20000400) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) 01:37:09 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r1, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0xffff, r1, &(0x7f0000000100)="2e00df0e7d0efb311f7871e2413140203df64b47235edfbdf46992eb201409fb447cc3dd03cadc44a0387bf8811a736d3aba9a5af3fa3eef7d39367436bfb87a0d170687ab1f9be177bd65272c4a7a0ecf9e0afa8c68b4019f550b4fa9d209b344e93aba69af90a5754d946123515bec0a41447d6d4273384bdd4161001842cb6314d1a0b7a8231fdbe2f6b553036c1c80ab41b908cdd2301c75c3bb7cd9223fb41c71306c3316b9141f5e1b9113c259ea6fe0447cb7bead6fee2dd40bf918ee0b5f180da8dc6263abdeca09603c1f25d4a4c39a8ba47a93fa8eec90f7473ec3e28673", 0xe3, 0x1f, 0x0, 0x0, r0}, &(0x7f0000000240)) r2 = syz_open_dev$vcsn(&(0x7f0000000040), 0x100000001, 0x80000) accept$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c) sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000000)=0x5, 0x4) unshare(0x6c020200) unshare(0x20000400) [ 924.359554][T21588] kobject_uevent: unable to create netlink socket! 01:37:09 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) r1 = syz_open_dev$vcsn(&(0x7f0000000040), 0x119, 0xc00) ioctl$RTC_UIE_ON(r1, 0x7003) 01:37:09 executing program 5: r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000280)={0x0, 0x0, 0x40000000}) 01:37:09 executing program 3 (fault-call:1 fault-nth:33): unshare(0x6c020200) unshare(0x40000200) 01:37:09 executing program 4: unshare(0x6c020200) unshare(0x20000400) r0 = socket(0x11, 0x3, 0x7fff) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) 01:37:09 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000000), 0x6, 0x5210c0) ioctl$RTC_WIE_OFF(r0, 0x7010) r2 = syz_open_dev$rtc(&(0x7f0000000080), 0x1000, 0x4002) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x3, 0x0) sendmsg$IPVS_CMD_ZERO(r3, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_DEL_SERVICE(r4, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x124, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8000}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macsec0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x26}}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x5}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x39, 0x1c}}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7e69bcce}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x87f7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}]}]}, 0x124}, 0x1, 0x0, 0x0, 0xc005}, 0x20000080) ioctl$RTC_VL_CLR(r3, 0x7014) ioctl$RTC_VL_CLR(r2, 0x7014) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000040)) 01:37:09 executing program 2: unshare(0x6c020200) r0 = socket(0x11, 0x3, 0x7fff) accept$inet6(r0, &(0x7f0000000040)={0xa,