x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x2) fcntl$setflags(r2, 0x2, 0x1) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f00000004c0), 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) inotify_init() setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000200)='syz_tun\x00', 0x10) r5 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x2008002) write$P9_RFLUSH(r4, &(0x7f0000000300)={0x7, 0x6d, 0x2}, 0x7) sendfile(r4, r5, &(0x7f0000d83ff8), 0x8000fffffffe) fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0x5}, 0x28, 0x1) write(r0, &(0x7f0000fdd000), 0x0) 03:47:01 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0xfeed, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) epoll_create(0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) epoll_create(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000340)=0xfffffffffffffd43) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000440)=0xc) pwritev(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x0) getpid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000800)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000500), 0xfffffffffffffdc0) syncfs(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/126, &(0x7f0000000400)=0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 03:47:02 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:02 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0xfeed, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) epoll_create(0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) epoll_create(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000340)=0xfffffffffffffd43) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000440)=0xc) pwritev(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x0) getpid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000800)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000500), 0xfffffffffffffdc0) syncfs(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/126, &(0x7f0000000400)=0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) 03:47:02 executing program 0: chmod(&(0x7f0000000500)='./file0\x00', 0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) seccomp(0x0, 0x0, &(0x7f0000000400)={0x0, &(0x7f00000003c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @remote}, &(0x7f0000000380)=0x10) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00', 0x19, 0x6, 0x0, [0x200005c0, 0x0, 0x0, 0x20000988, 0x20000c20], 0x0, &(0x7f0000000040), &(0x7f0000000fc0)=ANY=[]}, 0x78) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f00000003c0)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) syz_execute_func(&(0x7f0000000640)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d02ef20f2c50ad0f0da11b6a0000010d64ac1e5d3666440f3815f705987b7f") mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) eventfd2(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) waitid(0x0, 0x0, 0x0, 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffff9) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f00000007c0)={0x0, &(0x7f0000000740)}) listxattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)=""/14, 0xe) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000300), 0x1) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_open_procfs(0x0, &(0x7f0000000180)='mountstats\x00') syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:47:02 executing program 2: lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'osx.', '+/lobdev\x00'}) unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0), 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x7, 0x0, {0xb, 'security),}'}}, 0x14) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=@loop={'/dev/loop'}, &(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000480)='osx.') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) capset(&(0x7f0000000140), &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000380), 0xfffffffffffffcfd) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) setxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000800)='y\x00', 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0), &(0x7f0000000300)) syz_open_procfs(0x0, &(0x7f0000000880)='net/softnet_stat\x00') 03:47:02 executing program 5: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") 03:47:02 executing program 3: prctl$seccomp(0x59616d61, 0x0, &(0x7f0000000040)={0x2fe, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000340)) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000380)) ioperm(0x0, 0x0, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) chroot(&(0x7f0000000300)='./file0\x00') rt_sigpending(&(0x7f0000000500), 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000480)=@abs, &(0x7f0000000280)=0x6e) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x0, &(0x7f00000003c0), &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getgroups(0x0, &(0x7f0000000280)) setresgid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) fstat(0xffffffffffffffff, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000540)) 03:47:02 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0xfeed, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) epoll_create(0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) epoll_create(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000340)=0xfffffffffffffd43) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000440)=0xc) pwritev(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x0) getpid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000800)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000500), 0xfffffffffffffdc0) syncfs(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/126, &(0x7f0000000400)=0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 03:47:02 executing program 0: socketpair(0x1bfc0d216902bc57, 0x0, 0x0, &(0x7f00000002c0)) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000440)='net/wireless\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000600)='team_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000005c0)="212c656d3173656c664047504c73797374656dfe00"}, 0x30) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000300)) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000780)) waitid(0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000500)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) inotify_init1(0x0) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:47:03 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) 03:47:03 executing program 0: perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001940), 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) geteuid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) getegid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000400)={0x90}, 0x90) getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001a00)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000180)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:47:03 executing program 5: add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0), &(0x7f0000000640), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000001880)='cifs.idmap\x00', &(0x7f00000017c0), &(0x7f0000001840)='^md5sum\x00', 0xffffffffffffffff) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0x0) getpid() getpgid(0xffffffffffffffff) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) getpgrp(0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000380)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) getpgid(0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000080)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000c40)) keyctl$clear(0x7, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f0000000680)="42805da07e0fef29dc644f1750710000ce0acf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f6bc49999d2660f50fcd8c7270b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f42d9e4") 03:47:03 executing program 2: request_key(&(0x7f00000006c0)='rxrpc_s\x00', &(0x7f0000000700), &(0x7f00000007c0)='^md5sum\x00', 0xffffffffffffffff) add_key(&(0x7f0000000600)="706b6373375f74010000006480eb51c7aa3c1076b06f9e9ff66747bd033007cf928dc62d2b7ed106592d83016f5b488eac7a4ca484d295b003e824c9475887af70a05de85a4286b723913601eda9374c327ed69a1d4bb8026d8ea40207383b8231df989ff5e34f95d962195457ec1d931913d4fac940dfec730ce4533e81aa9a9a6863fe1c29df3b188f41817928da9c9fe922e59598a0e99d35e7c3bcad16", &(0x7f0000000540), &(0x7f0000000800), 0x0, 0x0) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000001880)='cifs.idmap\x00', &(0x7f00000017c0), &(0x7f0000001840)='^md5sum\x00', 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) getpgrp(0x0) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) getpgrp(0x0) clock_adjtime(0x0, &(0x7f0000004000)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000500)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) getpgid(0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000080)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000c40)) keyctl$clear(0x7, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe8}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) getpgrp(0x0) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:47:03 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0xfeed, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) epoll_create(0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) epoll_create(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000340)=0xfffffffffffffd43) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000440)=0xc) pwritev(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x0) getpid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000800)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000500), 0xfffffffffffffdc0) syncfs(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/126, &(0x7f0000000400)=0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) geteuid() 03:47:03 executing program 1: socketpair(0x1bfc0d216902bc57, 0x0, 0x0, &(0x7f00000002c0)) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000440)='net/wireless\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000600)='team_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000005c0)="212c656d3173656c664047504c73797374656dfe00"}, 0x30) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000300)) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000780)) waitid(0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000500)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:47:04 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) 03:47:04 executing program 1: add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0), &(0x7f0000000640), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000001880)='cifs.idmap\x00', &(0x7f00000017c0), &(0x7f0000001840)='^md5sum\x00', 0xffffffffffffffff) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0x0) getpid() getpgid(0xffffffffffffffff) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) getpgrp(0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000380)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) getpgid(0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000080)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000c40)) keyctl$clear(0x7, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe8}]}) ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x0) syz_execute_func(&(0x7f0000000680)="42805da07e0fef29dc644f1750710000ce0acf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f6bc49999d2660f50fcd8c7270b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f42d9e4") 03:47:04 executing program 0: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") 03:47:04 executing program 5: lremovexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@random={'osx.', '+/lobdev\x00'}) unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0), 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000002c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x7, 0x0, {0xb, 'security),}'}}, 0x14) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000003c0)=@loop={'/dev/loop'}, &(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='bpf\x00', 0x0, &(0x7f0000000480)='osx.') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) capset(&(0x7f0000000140), &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000380), 0xfffffffffffffcfd) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) setxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f00000007c0)='trusted.overlay.origin\x00', &(0x7f0000000800)='y\x00', 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0), &(0x7f0000000300)) 03:47:04 executing program 2: add_key(&(0x7f0000000580)='pkcs7_test\x00', &(0x7f00000005c0), &(0x7f0000000640), 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000a80)='trusted\x00', &(0x7f0000000780), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000001880)='cifs.idmap\x00', &(0x7f00000017c0), &(0x7f0000001840)='^md5sum\x00', 0xffffffffffffffff) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000004c0), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000004180)=ANY=[], 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getpgid(0x0) getpid() getpgid(0xffffffffffffffff) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ac0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c00)) getpgrp(0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000380)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) getpgid(0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000080)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000c40)) keyctl$clear(0x7, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe8}]}) syz_execute_func(&(0x7f0000000680)="42805da07e0fef29dc644f1750710000ce0acf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f6bc49999d2660f50fcd8c7270b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f42d9e4") 03:47:04 executing program 3: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") 03:47:04 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) 03:47:05 executing program 1: socketpair(0x1bfc0d216902bc57, 0x0, 0x0, &(0x7f00000002c0)) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000440)='net/wireless\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000600)='team_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f00000005c0)="212c656d3173656c664047504c73797374656dfe00"}, 0x30) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000001700), 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x0, 0x0, &(0x7f0000000300)) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000780)) waitid(0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000500)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) inotify_init1(0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") 03:47:05 executing program 0: getitimer(0x0, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000540)) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") pipe(&(0x7f0000000400)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000006c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440), 0x0) ustat(0x0, &(0x7f0000000280)) vmsplice(0xffffffffffffffff, &(0x7f0000000900), 0x0, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) ppoll(&(0x7f0000000680), 0x0, &(0x7f0000000700)={0x77359400}, &(0x7f0000000740), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) 03:47:05 executing program 5: perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001940), 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) geteuid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x0, 0x0) getegid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000400)={0x90}, 0x90) getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000001a00)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) syz_execute_func(&(0x7f0000000180)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:47:05 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in, @in=@local}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000002c80)=0xe8) getegid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000400)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) mlock2(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") setregid(0x0, 0x0) 03:47:05 executing program 3: 03:47:05 executing program 2: 03:47:05 executing program 2: getrusage(0x1, &(0x7f0000000900)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000040)) clock_getres(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000600)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12d000fed84210b000000cacad379dae5cfe5e56aac410f0fbd0900006736660f38108301080000c4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @remote, @local}, &(0x7f0000000a80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'veth0_to_bond\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'ipddp0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@dev, @in6}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc5d034e2f72095fe) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in=@local, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast1}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)={@mcast1}, &(0x7f0000001240)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001340)={0x0, @empty, @local}, &(0x7f0000001380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@dev}}, {{@in6=@mcast1}}}, &(0x7f00000016c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'veth0_to_team\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@mcast1}, &(0x7f0000001800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001880)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@mcast2}}, &(0x7f0000001980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a80)={{{@in=@loopback, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001b80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001bc0)={@rand_addr, @multicast2}, &(0x7f0000001c00)=0xc) 03:47:05 executing program 3: getitimer(0x0, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") pipe(&(0x7f0000000400)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000006c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000280)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001cc0)) getpgrp(0x0) gettid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003b00)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003b40)) getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000042c0)) getpid() getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f00000043c0), 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000700)={0xb}, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) 03:47:05 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:06 executing program 0: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0xfeed, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) epoll_create(0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) epoll_create(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000340)=0xfffffffffffffd43) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000440)=0xc) pwritev(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x0) getpid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000800)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000500), 0xfffffffffffffdc0) syncfs(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)=""/126, &(0x7f0000000400)=0x7e) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) geteuid() getgid() 03:47:06 executing program 5: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") 03:47:06 executing program 1: 03:47:06 executing program 1: 03:47:06 executing program 3: 03:47:06 executing program 1: 03:47:06 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:06 executing program 2: 03:47:06 executing program 3: 03:47:06 executing program 1: 03:47:06 executing program 2: 03:47:06 executing program 3: 03:47:07 executing program 0: 03:47:07 executing program 5: 03:47:07 executing program 1: 03:47:07 executing program 3: 03:47:07 executing program 2: 03:47:07 executing program 2: 03:47:07 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:07 executing program 3: 03:47:07 executing program 1: 03:47:07 executing program 5: 03:47:07 executing program 0: 03:47:07 executing program 2: 03:47:07 executing program 3: 03:47:07 executing program 1: 03:47:07 executing program 0: 03:47:07 executing program 2: 03:47:07 executing program 5: getitimer(0x0, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000540)=@filename='.\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='hfs\x00', 0x0, &(0x7f0000000740)='ip6gre0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") pipe(&(0x7f0000000400)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000006c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440), 0x0) ustat(0x0, &(0x7f0000000280)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f00000008c0)='security.capability\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000940)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000880)='security+[\x00'}, 0x30) creat(&(0x7f0000000140)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000000780)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000800)=0x80, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000840)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) 03:47:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvfrom(r2, &(0x7f0000000240)=""/29, 0x1d, 0x0, &(0x7f0000000280)=@l2, 0x80) 03:47:08 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:08 executing program 1: r0 = socket$inet6(0xa, 0x8000b, 0x108002) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe04) r1 = accept4(r0, &(0x7f0000000340)=@alg, &(0x7f0000000100)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6(0xa, 0x8, 0x401) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x10) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000003c0)={'filter\x00', 0x7, 0x4, 0x4a8, 0x140, 0x0, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000180), {[{{@arp={@loopback, @dev={0xac, 0x14, 0x14, 0x1d}, 0xff, 0xff, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}, 0xbe, 0x5, 0x10000, 0x100000000, 0xf07, 0x80, 'vlan0\x00', 'bond_slave_1\x00', {0xcac2bca4af278695}, {0xff}, 0x0, 0x20}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @empty, @local, @multicast2, 0xd}}}, {{@arp={@rand_addr=0x4, @dev={0xac, 0x14, 0x14, 0x18}, 0xffffff00, 0xff000000, @empty, {[0xff, 0xff, 0xff, 0x0, 0x0, 0xff]}, @mac=@remote, {[0xff, 0x0, 0x0, 0xff, 0xff, 0xff]}, 0x81, 0x5, 0xfffffffffffffffa, 0x9, 0x2, 0x6, 'gretap0\x00', 'syzkaller1\x00', {}, {}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @multicast2, @multicast1, 0xf}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) ioctl(r3, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000200)=0x14) 03:47:08 executing program 3: 03:47:08 executing program 0: getitimer(0x0, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000540)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000ac0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b80)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@ipv4={[], [], @loopback}}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000c80)=0xe8) getgroups(0x0, &(0x7f0000000cc0)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000d00)={0x10}, 0x10) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") pipe(&(0x7f0000000400)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000006c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440), 0x0) ustat(0x0, &(0x7f0000000280)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_settings={0x0, 0x0, @te1=&(0x7f0000000fc0)}}) creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) 03:47:08 executing program 2: 03:47:08 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000280)=0x44) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000080)={0x0, 0x0, 0x2}, 0xc) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x3a, @rand_addr, 0x4e24, 0x0, 'ovf\x00'}, {@local, 0x4e24}}, 0x44) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000000c0)={{0x0, @rand_addr=0x7, 0x4e22, 0x2, 'nq\x00', 0x3, 0x0, 0x35}, {@remote, 0x4e21, 0x0, 0x0, 0x0, 0x47}}, 0x44) 03:47:08 executing program 3: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300), &(0x7f0000000180)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000000c0)=""/159) wait4(0x0, &(0x7f0000000440), 0x0, &(0x7f0000000480)) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000001c0)) 03:47:08 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00'}) write(r2, &(0x7f0000000340), 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 03:47:08 executing program 5: r0 = getpid() pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clone(0x22102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) sched_setscheduler(r0, 0x80000000005, &(0x7f0000000080)) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000002c0)=""/213) 03:47:08 executing program 5: getitimer(0x0, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") pipe(&(0x7f0000000400)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000540)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) ustat(0x0, &(0x7f0000000280)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)={'L+', 0xadd}, 0x28, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000680)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) 03:47:08 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x8) 03:47:09 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:09 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) write$P9_RATTACH(r1, &(0x7f0000000240)={0x14}, 0x0) clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000140)) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x8, 0x0, 0xffffffffffff0234}) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000000)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 03:47:09 executing program 5: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) write$FUSE_STATFS(0xffffffffffffffff, &(0x7f0000000340)={0xff14}, 0xffffffcc) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:09 executing program 0: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) seccomp(0x0, 0x0, &(0x7f0000000100)) keyctl$describe(0x6, 0x0, &(0x7f00000002c0)=""/73, 0x49) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000980), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x9b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) accept(0xffffffffffffffff, &(0x7f0000000740)=@ax25, &(0x7f00000000c0)=0x80) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000340)) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000a00)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000007c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298c422ed7992749f55") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@loopback}, &(0x7f0000000640)=0x14) fsync(0xffffffffffffffff) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000d80)=""/4096, 0x1000, 0x0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="ea0d207bc1db"}, 0x14) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000003c0)) 03:47:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:09 executing program 3: memfd_create(&(0x7f00000002c0)='rxrpc_s\x00', 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000380)={0x0, &(0x7f0000000300)}, 0x10) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000340), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000140)={{0x77359400}}, 0x18) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) dup(0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f00000007c0)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) writev(0xffffffffffffffff, &(0x7f0000000640), 0x0) epoll_create(0x0) request_key(&(0x7f00000005c0)='rxrpc_s\x00', &(0x7f00000006c0), &(0x7f0000000700)='}bdev.selinux\x00', 0xfffffffffffffffa) 03:47:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:09 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:10 executing program 5: getitimer(0x0, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='tmpfs.', 0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") pipe(&(0x7f0000000400)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000006c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440), 0x0) ustat(0x0, &(0x7f0000000280)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000640)={'ip6gre0\x00', @ifru_data=&(0x7f0000000600)="55a7d3de2425f647cea8481bc319f20e48470ba0a9a84621dbf14d0b1a90f383"}) creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000700)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) 03:47:10 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:10 executing program 0: r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000100)={0x11, @multicast1, 0x4e21, 0x0, 'lblcr\x00'}, 0x2c) r1 = getpid() pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) clone(0x22102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000400), 0xffffffffffffffff) sched_setscheduler(r1, 0x80000000005, &(0x7f0000000080)) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000002c0)=""/213) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f0000000000), &(0x7f0000000040)=0x4) 03:47:10 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000040)) 03:47:10 executing program 5: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000000040)='./file0\x00', 0x1000001041, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000640), &(0x7f0000000680)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000240)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) open$dir(&(0x7f0000000080)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) wait4(0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000580)) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000002c0)) 03:47:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:10 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:10 executing program 0: getrusage(0xffffffffffffffff, &(0x7f0000000e40)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000040)) clock_getres(0x0, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000300)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @remote, @local}, &(0x7f0000000a80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'veth0_to_bond\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'ipddp0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@dev, @in6}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000cc0), &(0x7f0000000d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001380)={{{@in=@local, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0x792a05b) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in=@remote}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast1}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)={@mcast1}, &(0x7f0000000400)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000580)={0x0, @empty, @local}, &(0x7f0000000140)=0xffffff4c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000001580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @remote}, @in6=@dev}}, {{@in6=@mcast1}}}, &(0x7f00000003c0)=0xffffffffffffff71) getpeername$packet(0xffffffffffffffff, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001740)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'veth0_to_team\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@mcast1}, &(0x7f0000001800)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001880)={{{@in=@loopback, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@mcast2}}, &(0x7f0000001980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a80)={{{@in=@loopback, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000001b80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001bc0)={@rand_addr, @multicast2}, &(0x7f0000001c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001c40)={@multicast1, @loopback}, &(0x7f0000001c80)=0xc) 03:47:10 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) r1 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x3ff, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000300)={0x8000, 0x0, 0x0, 0x10000}, 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000100)) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000180)={{0x3a, @rand_addr, 0x4e24, 0x0, 'ovf\x00'}, {@local}}, 0x44) 03:47:10 executing program 3: 03:47:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:11 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:11 executing program 3: 03:47:11 executing program 3: 03:47:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:11 executing program 3: 03:47:11 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:11 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r0, r1, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000100)={0x7}, 0x7) 03:47:11 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:11 executing program 5: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000300)) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000200)) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 03:47:11 executing program 0: [ 605.443405] IPVS: ftp: loaded support on port[0] = 21 [ 605.487209] device bridge_slave_1 left promiscuous mode [ 605.492880] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.546247] device bridge_slave_0 left promiscuous mode [ 605.551816] bridge0: port 1(bridge_slave_0) entered disabled state 03:47:12 executing program 3: 03:47:12 executing program 0: 03:47:12 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:12 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:12 executing program 0: 03:47:12 executing program 3: 03:47:12 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) [ 605.722876] team0 (unregistering): Port device team_slave_1 removed [ 605.806153] team0 (unregistering): Port device team_slave_0 removed [ 605.843433] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 605.921406] bond0 (unregistering): Releasing backup interface bond_slave_0 03:47:12 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) 03:47:12 executing program 0: 03:47:12 executing program 3: [ 606.076017] bond0 (unregistering): Released all slaves [ 606.969890] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.977592] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.985141] device bridge_slave_0 entered promiscuous mode [ 607.033857] bridge0: port 2(bridge_slave_1) entered blocking state [ 607.040504] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.048699] device bridge_slave_1 entered promiscuous mode [ 607.095067] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 607.141011] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 607.281872] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 607.332306] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 607.380431] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 607.388112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 607.570581] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 607.577884] team0: Port device team_slave_0 added [ 607.606924] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 607.614014] team0: Port device team_slave_1 added [ 607.653480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 607.702355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 607.739191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 607.746689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 607.754594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 607.783489] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 607.790575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 607.799189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 608.089608] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.096031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.102648] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.109081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.117008] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 608.205637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 609.036056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 609.124903] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 609.213186] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 609.219395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 609.226971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 609.314538] 8021q: adding VLAN 0 to HW filter on device team0 03:47:16 executing program 5: 03:47:16 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:16 executing program 0: 03:47:16 executing program 3: 03:47:16 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) 03:47:16 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:16 executing program 0: 03:47:16 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:16 executing program 3: 03:47:16 executing program 5: 03:47:16 executing program 0: 03:47:16 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:16 executing program 5: 03:47:16 executing program 3: 03:47:16 executing program 5: 03:47:16 executing program 3: 03:47:16 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) 03:47:17 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:17 executing program 0: pipe(&(0x7f00000000c0)) fchmodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$RTC_AIE_OFF(r0, 0x7002) 03:47:17 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2c00) 03:47:17 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:17 executing program 3: clock_gettime(0x2, &(0x7f0000000600)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f00000000c0)) creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000240)) getuid() set_tid_address(&(0x7f00000001c0)) fstatfs(0xffffffffffffffff, &(0x7f0000000300)=""/95) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c190aad9f28fc90f194120c461781337e5e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029fc402c18c26") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d00), &(0x7f0000001d40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001d80)) fcntl$getown(0xffffffffffffffff, 0x9) getgid() getpgrp(0xffffffffffffffff) getgroups(0x0, &(0x7f0000001e00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001e40)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003340)) stat(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003440)) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003b80)) fstat(0xffffffffffffffff, &(0x7f0000003bc0)) getpid() getgroups(0x0, &(0x7f0000003c40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getgid() getpid() getgroups(0x0, &(0x7f0000003cc0)) gettid() 03:47:17 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:17 executing program 5: getegid() fstat(0xffffffffffffff9c, &(0x7f0000000280)) getgid() setgroups(0x0, &(0x7f00000001c0)) unlink(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) prctl$getname(0x10, &(0x7f0000000300)=""/173) getgroups(0x0, &(0x7f00000001c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) setgroups(0x0, &(0x7f0000000280)) getegid() getegid() setresgid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") 03:47:17 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) [ 610.806117] audit: type=1326 audit(1536896837.354:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17891 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:47:17 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:17 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:17 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r1, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:18 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:18 executing program 0: 03:47:18 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) [ 611.556223] audit: type=1326 audit(1536896838.104:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=17891 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:47:18 executing program 3: 03:47:18 executing program 0: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000800)='team0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") 03:47:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x0) 03:47:18 executing program 3: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000a40), 0x4) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000a80)) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") 03:47:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:19 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:19 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x17f, 0x163) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100)="1b", 0x1, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x229f, 0x0, 0x0, 0xb4) 03:47:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) [ 612.841040] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:47:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:19 executing program 0: clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@multicast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in6, @in=@remote}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000e40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000ec0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000a680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a6c0)={{{@in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f000000a7c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a800)={{{@in6=@local, @in6=@ipv4={[], [], @local}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000a900)=0xe8) accept(0xffffffffffffffff, &(0x7f000000a940)=@xdp, &(0x7f000000a9c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@rand_addr, @broadcast}, &(0x7f000000aa40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000bb00), 0x0, 0x0, &(0x7f000000bc00)={0x0, 0x989680}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:47:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x0) 03:47:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) 03:47:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:19 executing program 3: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000800)='team0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b00)={{{@in6=@ipv4, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000c00)=0xe8) getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") 03:47:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:20 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:20 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:20 executing program 5: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000014c0)={0x0, 0x1}) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) unshare(0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000003c0)) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = socket(0x11, 0x200000000080002, 0x0) getpgid(0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x3f, 0x4) setsockopt(0xffffffffffffffff, 0xeb, 0x0, &(0x7f0000000480)="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", 0xf5e) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000440)=@req={0x7fffffff, 0x0, 0x5}, 0x10) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000400)) 03:47:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:20 executing program 0: io_setup(0x8000000000006, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), 0x4) getpgrp(0xffffffffffffffff) getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) io_setup(0x0, &(0x7f00000001c0)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:47:20 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:20 executing program 3: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000a40), 0x4) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000a80)) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, [], [], [], 0x0, 0x0, 0x0, 0x0, "b4db5ee462a71df8fa5d18888301d878"}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) 03:47:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:20 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:21 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:21 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:21 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:21 executing program 0: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'lo\x00'}) sendmsg$nl_route(r1, &(0x7f0000005700)={&(0x7f0000000040), 0xc, &(0x7f00000056c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000001400040000001d00001e5c30344562f01c63e2bc1ade56212cd2311c427e24e08cbce7e8c309e6f6d13c5bbb00c4d09ea6a381e3c9a442e59def5a054f9049dc3adb25e9d74f7545a3940e6174db5e9311a1982cb4e304722b7feb4063c0b849827c81509e7c9fd540d4a71f52e6b897906d25cf7636392bd064937d8b7d48c741b0e1000000000000000000000000000000"], 0x1}}, 0x0) 03:47:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:21 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:21 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000003d40)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) fchmodat(r2, &(0x7f0000000040)='./file0\x00', 0x180) 03:47:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') poll(&(0x7f0000000040)=[{r0, 0x8000}, {r1, 0x50}], 0x2, 0x8) ioctl$sock_proto_private(r0, 0x89ed, &(0x7f0000000080)="09f03cbff1c820aa6ec99c1ca8349365b3da6d11e8b6c6a8fef4b8b131264ba8e8dc9caa6c69209cbf335892b2000d2b98b243d4e1b4b1036129f3f20e50fddbdeda09a80404a2e46b60d458458a1b4189fd7b1ff38a5a61c8c6dc485efd084c9219ea7b1f825e34387e2ebc40a7bd2026ddc83d9080dc5bf966e90359ea2bf14dcc3675d61e0c0791ced2d255677884d53c6bbf2245fb5238718e7494f252343f4d2ceca0f55b57c5afffffb0b4a5783ed7a2ddec416245a9d29bbb8b57da641fe215a9b16ab85af4e9be0c8e8086c5b4f87d7f3af529f25456") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x11) r4 = openat(r3, &(0x7f0000000200)='./file0\x00', 0x100, 0x0) write$P9_RCLUNK(r4, &(0x7f0000000240)={0x7, 0x79, 0x2}, 0x7) close(r2) setns(r1, 0x18000000) ioctl$FIONREAD(r4, 0x541b, &(0x7f0000000280)) syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') fsync(r4) socket$inet6_udp(0xa, 0x2, 0x0) 03:47:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:21 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:21 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) 03:47:21 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}, {&(0x7f00000016c0)=""/4096, 0xa003}], 0x2, &(0x7f0000000240)}, 0x0) 03:47:21 executing program 3: getitimer(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a02e6969ef69dc00d9f436640f01210fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a66f3400fbde201eec46219b98100000000262e6426f30f2b05090000003f") 03:47:21 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:21 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") [ 615.453595] tmpfs: No value for mount option '/dev/audio#' 03:47:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}], 0x1, &(0x7f0000000240)}, 0x0) 03:47:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}], 0x1, &(0x7f0000000240)}, 0x0) 03:47:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/146, 0x92}], 0x1, &(0x7f0000000240)}, 0x0) 03:47:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000016c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000240)}, 0x0) 03:47:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000016c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000240)}, 0x0) 03:47:22 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(tnepres)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) sendto$unix(r2, &(0x7f0000000400), 0xff26, 0x0, 0x0, 0x22) recvmsg$kcm(r2, &(0x7f00000003c0)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f0000000340)=[{&(0x7f00000016c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000240)}, 0x0) [ 616.250052] tmpfs: No value for mount option './file0' 03:47:22 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:22 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:22 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) 03:47:22 executing program 3: getitimer(0x1, &(0x7f0000000140)) clock_settime(0x0, &(0x7f0000000280)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getitimer(0x0, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:47:22 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:22 executing program 1: getitimer(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f0000000080)) syz_execute_func(&(0x7f00000003c0)="428055a02e6969ef69dc00d9f436640f01210fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a66f3400fbde201eec46219b98100000000262e6426f30f2b05090000003f") [ 616.516216] tmpfs: No value for mount option '/dev/audio#' 03:47:23 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:23 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:23 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) 03:47:23 executing program 1: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) getuid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000006c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @rand_addr}, 0x10) syz_execute_func(&(0x7f0000000400)="42805da0510f61e2db0595c3300dcececb9ee506158e7e0c91a33d062900770f78993d233d2341745f4a864a8680eb0a5f8dee39290fb2827d20c9c4a10dfbd6fee60f2e2121018f69d898b4c2b298220a31a3b7e2989d") 03:47:23 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:24 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 617.509585] tmpfs: No value for mount option '/dev/audio#' 03:47:24 executing program 1: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) creat(&(0x7f00000000c0)='./file1\x00', 0x28) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440), &(0x7f0000000200)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) execve(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000740), &(0x7f00000004c0)) open$dir(&(0x7f0000000540)='./file0\x00', 0x82, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000380)=""/162) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000800)) 03:47:24 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:24 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:24 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:24 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:24 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:25 executing program 1: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000e40), 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() openat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f00000006c0)=0x14) fstatfs(0xffffffffffffffff, &(0x7f0000000280)=""/102) fcntl$getown(0xffffffffffffff9c, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@rand_addr}, &(0x7f0000000440)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000840), &(0x7f0000000880)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @empty, @loopback}, &(0x7f0000000900)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001100)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in6=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001480)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000014c0)={@remote, @multicast2}, &(0x7f0000001500)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680), &(0x7f00000016c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000019c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in=@local, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002140)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a80), &(0x7f0000006ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007b40)={'sit0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:47:25 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") [ 618.466883] tmpfs: No value for mount option '/dev/audio#' 03:47:25 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:25 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:25 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:25 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:25 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:25 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) 03:47:25 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 619.358075] tmpfs: No value for mount option '/dev/audio#' 03:47:26 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:26 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:26 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2c0000002f00290800000000000000000300000018000000140001000400f6f61d2d0d000007000000000000"], 0x1}}, 0x0) 03:47:26 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:26 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:26 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:26 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:26 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) [ 620.395038] tmpfs: No value for mount option '/dev/audio#' 03:47:27 executing program 1: getitimer(0x1, &(0x7f0000000140)) clock_settime(0x0, &(0x7f0000000280)) futex(&(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:47:27 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:27 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:27 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) 03:47:27 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:47:27 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") [ 621.338483] tmpfs: No value for mount option '/dev/audio#' 03:47:27 executing program 1: geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000440), 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x14}, 0x14}}, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000a80)={0x0, &(0x7f0000000a00)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000b80)="428055a0866969ef69dc00d9f80a8b001f0080df20df205d0c4d88183739f7400fd2cfc19086d9f28fc9410feefa0707e5e55145754545eadcfe420f45e50000008066400f3a1415c4017b10a00d000000e700c441fa7eb9dc000000360f1ad78e9fc421f970c4e3fd0929dd7baec462fd255c5400c9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:28 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:28 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:28 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:28 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:47:28 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 622.294496] tmpfs: No value for mount option '/dev/audio#' 03:47:28 executing program 1: io_setup(0x8000000000006, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), 0x4) getpgrp(0xffffffffffffffff) getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) io_setup(0x0, &(0x7f00000001c0)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:47:28 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:29 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:29 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:29 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:29 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") [ 623.237525] tmpfs: No value for mount option '/dev/audio#' 03:47:29 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:30 executing program 1: ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40046602, &(0x7f0000000140)) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000000c0)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000240)=@mangle={'mangle\x00', 0x1f, 0x6, 0x588, 0x1fc, 0x0, 0x1fc, 0x0, 0x480, 0x61c, 0x61c, 0x61c, 0x61c, 0x61c, 0x6, &(0x7f00000001c0), {[{{@uncond, 0x0, 0xc8, 0xec}, @inet=@DSCP={0x24, 'DSCP\x00'}}, {{@ipv6={@local, @local, [], [0xffffff00, 0xffffffff, 0xffffffff], 'bridge0\x00', 'ip6gretap0\x00'}, 0x0, 0xc8, 0xec}, @inet=@TOS={0x24, 'TOS\x00'}}, {{@ipv6={@loopback, @loopback, [], [], 'veth0_to_team\x00', 'ip6gretap0\x00', {}, {}, 0x0, 0x0, 0x5}, 0x0, 0xc8, 0x10c}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv4=@remote, 0x0, 0x7}}}, {{@ipv6={@ipv4={[], [], @local}, @loopback, [], [], 'tunl0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc8, 0xec}, @inet=@DSCP={0x24, 'DSCP\x00'}}, {{@uncond, 0x0, 0xc8, 0xec}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x5e4) 03:47:30 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:30 executing program 1: clone(0x200, &(0x7f00000000c0), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540), &(0x7f00000005c0)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000003c0)=""/159) fchownat(r2, &(0x7f0000000480)='./file0/file0/file0\x00', 0x0, 0x0, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000380)) 03:47:30 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:30 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:30 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:30 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:30 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:30 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:30 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:30 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") [ 624.194192] tmpfs: No value for mount option '/dev/audio#' 03:47:30 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:30 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:31 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:31 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85b, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip6_tables_names\x00') 03:47:31 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:31 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:31 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) prctl$intptr(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) ptrace$peekuser(0x3, 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000004c0)='/dev/dsp#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') ioctl$DRM_IOCTL_SET_VERSION(0xffffffffffffffff, 0xc0106407, &(0x7f00000000c0)) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)) geteuid() stat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000003040)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003080)={{{@in6=@remote, @in6=@remote}}, {{@in=@multicast1}}}, &(0x7f0000003180)=0xe8) getresgid(&(0x7f00000031c0), &(0x7f0000003200), &(0x7f0000003240)) lstat(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)) lstat(&(0x7f0000003340)='./file0\x00', &(0x7f0000003380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003400)={{{@in6=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000003500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003540)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e00)={{{@in=@loopback, @in6=@mcast2}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000003f00)=0xe8) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:47:31 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:31 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:31 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:31 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:31 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:31 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 625.089296] tmpfs: No value for mount option '/dev/audio#' 03:47:31 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:31 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:31 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:32 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") [ 625.466315] tmpfs: No value for mount option '/dev/audio#' 03:47:32 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 625.735739] tmpfs: No value for mount option '/dev/audio#' 03:47:32 executing program 1: io_setup(0x8000000000006, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000140), 0x4) getpgrp(0xffffffffffffffff) getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f0000000280)) tgkill(0x0, 0x0, 0x0) io_setup(0x0, &(0x7f00000001c0)) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:47:32 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:32 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:32 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:32 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:32 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 626.329365] tmpfs: No value for mount option '/dev/audio#' 03:47:33 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:33 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:33 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:33 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:33 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:33 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:33 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512\x00'}, 0x58) 03:47:33 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:33 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") [ 627.272247] tmpfs: No value for mount option '/dev/audio#' 03:47:34 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:34 executing program 1: r0 = semget(0x3, 0x0, 0x0) semctl$GETNCNT(r0, 0x3, 0xe, 0xfffffffffffffffd) 03:47:34 executing program 1: clone(0x1ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x4061) read(r0, &(0x7f0000000000)=""/11, 0x1049a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = dup(r0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={@mcast1}) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f00000001c0)) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000300)=""/247, &(0x7f0000000080)=0xf7) 03:47:34 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:34 executing program 1: modify_ldt$read_default(0x2, &(0x7f0000000400)=""/248, 0xf8) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000640)={'syz0'}, 0x4) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000000)) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000200)) rt_sigtimedwait(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000140)={0x0, 0x989680}, 0xf096fce865f00b85) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0), 0x0, &(0x7f0000000600)={0x0, 0x1c9c380}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000680), 0xc, &(0x7f00000007c0)={&(0x7f0000000700)={0x14}, 0x14}}, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:47:34 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:34 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:34 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:34 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:34 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:34 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 628.229525] tmpfs: No value for mount option '/dev/audio#' 03:47:34 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:34 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:35 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:35 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:35 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:35 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:35 executing program 1: epoll_create1(0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000002c0)={0x0, @dev, 0x0, 0x0, 'wrr\x00'}, 0x2c) truncate(&(0x7f0000000100)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f00000003c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:47:35 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:35 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:35 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:35 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 629.171994] tmpfs: No value for mount option '/dev/audio#' 03:47:35 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:35 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:36 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:36 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:36 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:36 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:36 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:36 executing program 1: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000006c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) clock_gettime(0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) fstat(0xffffffffffffffff, &(0x7f00000005c0)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000200), 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) setregid(0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000001600)={0x8, "9ba2e6572a239d9e90e399fc2819c9d208404679e47ffd3f7f0850b06e0de8b86f87567b68197b48154e11f5ee99408bbfd097509e93ee6f4540aa3afba5897b2dfd94bff5d7d75fd2ddd4efb6e98ebbe809126b5a951deb3a175eb05d368839d940ddc454543b650ed37c2a6c49f5dbcb90660f633c4feded4efd7fa568ea22a5d23d507ecbe7f06f744bf68cf180369fff4b68a0e34abc32c6fbc196d262f2005a18b5197c31e58380770228fa5c15ca6b96583c12b2729311f20817ad18c0d5837aac8c794c513d7f1042a509520bfe0b663bb3e327579129cc61730208b1450e5f1b2e3e24d89123a1c645f0d187c92c2ba730b91048304c7a6015c289bee835695dc8a6cd7536b9324fe2648c36469f344819e6cf78bcc1002091b41e5215bdb5d3bbf32600d41068c3dac6128c2452ffde51a97f8d016e66a09f240820f1353c0ed32e40c5e0865dc68b12d346888ec31bd418a8f5894cffade7f8f88dd4d69b9f54a539154add6b9a1a7b01e42d2fda4baf84f253f681c74ad4bad7fb186ecad63b10baa6920d157c8bc30b211983978a6dec3c5d2d13dea26414009520bb2b1d2809c22458c429e09f0a9047da328464edc14620124f3c97a95299123d0c49a1ca65ccc2c42d4bd6f4e6cf57dd0628b56de16ad975308ab2850607a14ee56b2948dfd418116fc969552dd425909ecbdf4b247726c39fa55e6418fa195b99b6d4264424a50ac4bd6810a2ec3b5c6976abaebb929752d13c284df2a39027e364555d3ecda357ca1219ceb23acdec4d088949598a98d52f6b1d913b5b4257b5d3fcbdbbd276a405dbbb057ac1ae753d0020ad42e5d1f2d0b60aab5b226ee86fe5ed3f72b738d8224827c6b1ca00ce1b50801f52e4b91d9b8dd9a70234706b83aa42652acd08a10876b6e3144597cbafbe69692a7fffe73d471121143f381ead438c61454c0f3a0102948cf3cfe99e322785b346f5fd3bb774871727436a88b7f7d8b8282655f38e7aa9e19f2e65a3a41caddd1a52ba10c2adf13fde09752a1a56a78154d2d94dc12616a3063da6a1994d0b0c939b06de0c31603bb81fd580a854e45c7c09faa73aa1cd58c12dc484f2f1f2e7d9b7b8b6fdcdd4152862c1bfd6160224fa0cd0176213e131a0fea19b8d1f173984955ecc232c861cd66480dc4b6937c76e311bbb76f5b00e63c3246e825d04b6ce0303c31e66f17e8f38aae3df9ac8c77ab81c8b2520986e3892690d1db7fed40eeb74fad843d9dce503e0be83ef0b734552b9c9865e689fba8f58c36a62fbece5b8ce7608a816daeb3436cd08bd9198aaef5f864503d223f45ac8c6e1c917a50a3ad55b3aafea8d8480a4bf3ad27b2aed5b3fdaa6518e02190b70996302a65dab7c1dd6bbd84e63b99a46d46e7b57bd97c1e5c7263e38b44aff23f8c1a5c493beb1ffec2c638a2aa49b5d62ccb77515cfb7f4ca08edd06acc00f908040d41a5a39c1b4ae4d24b20f2d46bd1ce93bc57b39b7be602d4c2bbe48040c8e78c83e48fd48200a21499e838424c8607b667f60d9ca6cd968d81b3f0fbf41fa82bb55b3e95f5bb61d45ac9087c1ebd25578348db730ec8818676946bca9514598a498459120aeec74d6e8b12c8b94c7272143ca1b1423e0cf2118c17b3f02dc60d3865fede27e834a4f0a3fafde60e976720b7bf5b5cd352c3ae909c99aa74cd296ad47e7ce2303d4fae2e46634337abce088a5d4213f8a462769b58854ebf0fbaf1cd0fa679db6880f991368a77f444a667d12ab31e264d71bc63a95166f592d8e5813d97a8220f375f4cf4831ed03b4d0609e0ceec01efc0ef7efa8d399089516bbc0accf2ab3f8f05f8ad3688b1ffddc56accf890a9c48db4eb4e58770fed7b71d6aa6eac3d93f313a1c55aaa5b1f8e0ed7b768224326b8b8a026dfe3e5d312c3fa92137bb2fef6c939d3c67b9d738c873164393c305d2f2d1bf7cc0111ae173e5d00932a0b95559b9ff62c8a6b2a5caf4391292a6c02a97e0e89b364466b8aac99d1ff7e666b930ee8f097903b97fed4a7971a9a9ddee5b253661f6c696b9b1eeebbc31f7b3a43413dc9477d890f95f0e58c9a070751d6bee6c0af7160eeaaa31675d13ceb3b7e3e5b9f3843d2af1b2e371fc8700039d020b4208f4de2563f924c89f82a26cf634ca898e01e6fb3247090719c1eee25e15b54a7bc49ff9953f31044b52a26b1d94d74fe9e4c7462047b591849a799fdcd921e031ecfebb4a63b71e6eacf4b8213f16d86952ce68b443909978f35d27bcba85ea0e8526b00e422cc89b6554ea7b1e35c3b8341af9d492792b287de84a0cf609539cdce80aab4322bce80832002a84f1ff0629dd0a56b6ff2f87c792ce05811802037f571f7ad403e18132acc819c92b750d53a6bfdd380b93677cd14f3ed46ffe3e5b638674c59133c8cd5fb7238afbad085dc91c1efe4fa62c98ba002b1d7ac085f5bd613581a4af89789cf55c061d0af79fbe3d302e644c7b71049de4d0a550f8f660adfe8802d1547b1a5a52a741bb1079de44a77f652a8e6cc7ce97ef4e8424254eb981ef9ee0c54cd5b3dd410a1b7eaf3f5cea2dd505357aecf882775a6f94c5e5c2e54d18bff92240f1af65fc9a87b1313921c77662504111dbc3f769bbeed8abfbe71c676a140b24509db189ce1bfb88eb906ed039b75b8450e9730dde97514cb000906315fa5321d14a5c70ecbc27ecd5e701eff245e2a48aeb6949e7767728a4b16411a60a4b90d20f3f9d6daca9215000584f7a63a575185393cb89734bb0d7ec0ce13cdb22acc0abc271ac65f8229c5ef7ebe4c78bc322a9f54a687d1968ba9004ce48d8dd521f69e50ced992ca8532c29cab7322038b78d4cfea8414c0676d7f9cb744461e7bdced35fbed9fcbfd08b38f1847afe48f8b587dda3a1d7009806965b215c86207c02bbcbe2fbfcb638189048689135b1f31fcbad050294be19f71b952219043ea4dc78315de3d1e0e775d8bf1536f935edf3aab8058f65e6a532468015e4f2ae08008e70e7bdc5c3ee32e013813bf2ed727652fbf582bbe52e2ac1732b8c59c691f5c0c2e7c36e976cf7c621e7b073f30eba6c4cb2d9bae32739ae104eaf3aaac5c9f241a33a34efdcf8520d9a9967635d8c8529abe2d3692f923d20daefc88ff026896783cd9e35957a653809aab36cb9b6b5261e794e02cdef71a4c3ed099bfdb79be440824a23cf618f2446007bab579071e7005cf04c2327300b4bf9dee85270b8b20c0be80be3aee39d22f125a126823ed19e0a3d7334962c7cca41caa56c83a124d6016af31f86463c87ca16864b897d7c51d8a95dfbb9bd3fc1d12e3b1df92cc6a4a4c0c1ee486b6800a32da2137581d92a54448fef6f78aa0380515388853555c87f6dba8e14a7711e82bcc145f75f12a51d0c8f55cdc1d0d8ce11a6cab3706e7a94b218cf5bffd6b89679425919402067bdb9218caa00762b0a01659274a706c4641af404eeb000609fb1066ebd33ae308be620c6e96fbc11a5bdb8011f065345977bbef99e7266d8367419797334680ed50a4e4625dd8b325cdc94a71627a1d2365623f9cfcf73eab681947766f1736ac7bafed53383253e91a14daa973def93b98e405c8b76aa7ef16ef74bf63c323547bcbff7f080106845ade65ce8f3db37963cd9c22c8201345614fd4f51de09a1ff7a258324449f15551c35f020966b157e810c8a25846471e219d5b85af7d507e0bb47a9e803dfbc629adb70f6d540a31714250b18510d1501d94a090062e8f7af7005b1147fc8dda4b328d3f1b3420e91d34497f6063a721e8004b6866075710f42dc1feae121ffbcc51e2ec14a9e1439ae9097656925bd244fff693d2cac963a4ab0365b7ed5f5633dc916ed3e1b6c065fc463b6fce0e80483302e641afbe6017ca9e9cb119df331fd060f4a361c3b6d7c77360c47b54ba64fdb4f1352da7b9d298d5d97e01e132551575e79a8a4bd9fa787f727312dce96050eda3fc0d9d26712add289bc419a47816f2dd55dbfffc37d423a5d2899cb2bb257ad120f025475a90ab943d145fe4de212b4eb461e9bfc13398712589aaf80f073d67217a6b805cab423ba30c05e50da6c46711cf3d0fffc9ee69d8526d0d213b16dafc8635ae09a48cb37851b4eefb735ddaa3538fa62929f8c0740f782e43afeb2417e052ab7ffcf0e5535d80b90499e0de35d052a41d131147b42f1d51d6ee893a09a64f258b98df0100f7ca60e77c8849e82f51bf3e4d8c4ddcc9d68a22483b0760fd3387885b5923597d5aef9ab4df3aec28590981a4bf5d991ca247c74462f5f7a9dc9e49f0911467262cf5d1bd24fe62a274e96913e7c1d9840adc43bb0148227e93093c07e7156e352c38c5e161dd08306614e261c4c44f084880e610ae2523d6c950a01b36807e86af697b0697dc4b3e148ba9992da88b7bc0c8fd26979b66ea0e646eaf86d1a47872c40de9b1b0451bb503646174f9a64bfb1cd48165282a3423b9dbfe48f76bdfd7c8eb860aa518b000987ba6c754d48c96163ed0697abb3d738648825c3d096564caf2a2b2f48bc8383abc489f482c9a7ba257601e8f5c864f5d5898b29285b0f646fe8dfdf78e14d8c067dc496511d247e7f5870c8e7878aa49c09a5ed34a69a321bdb087573b80e750bbd2daba86009e42f0e61d454244394e3642a36e70b8186e98a931769fd8ed76885266e8a6c3f870f4c751f6c92b0519946c789eae38da3eb8d52ad42ad93ef806834357e37cb5756bc8c7a28dc6917ddf80fe75dd2e3c685147045186e78da017137cfbfcd241136630f7cc0af3f8e6237f73aba96cae15de730d3226b1c409dded22fae38062d315fa8dadbde242272e418a0fbebfef7333c65fbb032a305b8dfea31b81079192ed66582b963ef85a28273a046833707537691e1edca4fc34bae0f381c7b35e74d22f09d46ef64895e6fe834254328089491cc72f5e9a954e2747018ae4f2bd17811568fa7dc4c2e164f48fc2b7c6c1425b5261b0e2071ed373b95ad3e3c398e6d1a8d49e388e2c664dabb82e1707baa2dcd0c5521694e85761488a579d8e0aee5c22e43a1deefe790e685466df7123dfed7c103a261beb446621ba556884c3fd86f4dc8ad25e60c6545fa69cd43e6c502a4a02b4cbe7d012229fde98927f7503acb33cfcfb6386d690a928e42129c712d18b2f596e7fdc62fa0a404c2fb349f1d1dfbb2fb0b9bb0110c503902f0fb827b477d896de23f72489f206d9180740d683e1eb8392cd7bd077c47e21a230710d988443a36aabc9a2f455cfc67f29fc6e9bcf048509ea096be441b297f93a786b5e83df4fef23faadf65af82a8e504f540bae44f1648253704c6f3f6d69bcbba99e8cbb81aa7e5c3d882b48634f4eddff12c5cd1ded558d6656cff76439478e8a89839d5f6770c9e9aeecf3e4c993a91102fb6022d965f241ef14da0f0893d4097c5a19734ff5ae665658cd653926581967fa0b89b2d064abdec5f505bf0ba581ad0d4b180bb9ae1b992f1a2d9d73815c37479044f804350755c50d4f50aaee0eadde29dcd5e9da0e28f791cfa71a99bcd92282f885749971ce73a9ef850af101c6fcb3e608eeb2c184541ce60de58524f07b19655d6fa1d7a58768e308546f911d8833726a1f6d92e4f3bf7bf4e343d83d90514d976291ed21670078332e3edae1a8012a36cdf4e659063b95175b0d8d66eb319d32324b29ef8169b7ea7dc4821b6a6a481c94dde16ef08ac075fb4ea90ff6b751bfa2d88565c330b197c0c3146931e4a9c1ea89484749", 0x1000}, 0x1006) getpeername$packet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000640)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000780)={'syzkaller0\x00', {0x2, 0x0, @remote}}) getgid() ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000004c0)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000180)={0x78}, 0x78) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:47:36 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:36 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:36 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:36 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") [ 630.140363] tmpfs: No value for mount option '/dev/audio#' [ 630.266040] audit: type=1326 audit(1536896856.813:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18687 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:47:36 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67affcdf031a5a2080000001c26b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005800)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)="104a2d9e3da15b605e2e56c00c59cac3663635b2b23f9cac534d7471bf264849a8", 0x21}], 0x1, &(0x7f0000002800)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000100)}}, {{&(0x7f0000000200)=@sco, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000340)=""/12, 0xc}, {&(0x7f0000000580)=""/80, 0x50}], 0x2}}], 0x2, 0x0, 0x0) 03:47:37 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") [ 630.521556] audit: type=1326 audit(1536896857.063:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18700 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:47:37 executing program 5: syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f0000000540), &(0x7f0000000580)=0x4) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, &(0x7f00000001c0)) msgget(0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000200)) syz_execute_func(&(0x7f00000000c0)="c46215bf9a000000003d00100000430f96479e8f4818963a060f183af747565035b1690f38c82b36440fc7a700000080c4229998e7c4427d582d09000000") 03:47:37 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) vmsplice(r0, &(0x7f00000003c0)=[{&(0x7f0000000180), 0xffffffffffffffc6}], 0x1, 0x0) [ 630.711727] audit: type=1326 audit(1536896857.253:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=18710 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:47:37 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:37 executing program 1: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), &(0x7f0000000300)={0x0, 0x1c9c380}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300), &(0x7f0000000700), 0x0, 0x0) add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380), &(0x7f0000000040), 0x0, 0xfffffffffffffffe) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/llc\x00') write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) 03:47:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f0000000140)='syzkaller\x00'}, 0x48) socket$inet6(0xa, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000200)=""/143, 0x1a, 0x8f}, 0x20) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000300)) dup2(0xffffffffffffff9c, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000e80)="42805da0bd0fef69dc0f01eece73fe19fa443d0300000038211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e5417545c4010d64ac1e5d31a3b7c421f8526ffc71fb0703") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) fstat(0xffffffffffffff9c, &(0x7f0000000700)) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) getpgid(0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000cc0)='proc\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001640)) fstat(0xffffffffffffffff, &(0x7f0000001680)) getgroups(0x0, &(0x7f0000001700)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) stat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000002a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000019c0), &(0x7f0000002ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000001480)=0xfffffffffffffdb1) lstat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getpid() stat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) getresgid(&(0x7f0000004180), &(0x7f00000041c0), &(0x7f0000004200)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004340)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004300)='\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000004380)='./file0\x00', &(0x7f00000043c0)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004480)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004440)='keyringsystemem0^proc\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000044c0), &(0x7f0000004500)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004540)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000045c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004600), &(0x7f0000004640)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000048c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004900)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000004a00)=0xe8) stat(&(0x7f0000004a40)='./file0\x00', &(0x7f0000004a80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006f00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000006ec0)="70726f632dd46e6f6465766367726f7570292340656d302a23f000"}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006f40)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000007040)=0xe8) getgroups(0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000070c0)) geteuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007100), &(0x7f0000007140)=0xc) stat(&(0x7f0000007180)='./file0\x00', &(0x7f00000071c0)) fstat(0xffffffffffffffff, &(0x7f0000007240)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000072c0)={{{@in=@remote, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000073c0)=0xe8) getgroups(0x0, &(0x7f0000007400)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007480)={{{@in=@loopback, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000007580)=0xe8) lstat(&(0x7f00000075c0)='./file0\x00', &(0x7f0000007600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000007680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000076c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000077c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000007800)) gettid() geteuid() getresgid(&(0x7f0000007b40), &(0x7f0000007b80), &(0x7f0000007bc0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007c00)={{{@in6=@loopback, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000007d00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007d40), &(0x7f0000007d80)=0xc) gettid() geteuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000008300)) 03:47:37 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:37 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:37 executing program 5: rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0x8) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000800)='team0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") [ 631.070910] tmpfs: No value for mount option '/dev/audio#' 03:47:37 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:38 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:38 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:38 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6(0xa, 0x81000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000004ec0)=[{{&(0x7f0000000540)=@l2, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000640)=""/140, 0x8c}], 0x1, &(0x7f0000001a80)=""/192, 0xc0}}], 0x1, 0x0, &(0x7f0000003e00)={0x77359400}) [ 631.980643] tmpfs: No value for mount option '/dev/audio#' 03:47:38 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:38 executing program 5: getegid() fstat(0xffffffffffffff9c, &(0x7f0000000280)) getgid() setgroups(0x0, &(0x7f00000001c0)) unlink(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) prctl$getname(0x10, &(0x7f0000000300)=""/173) getgroups(0x0, &(0x7f00000001c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) setgroups(0x0, &(0x7f0000000280)) getegid() getegid() setresgid(0x0, 0x0, 0x0) pipe(&(0x7f0000000000)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") 03:47:38 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") [ 632.164666] tmpfs: No value for mount option '/dev/audio#' 03:47:38 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 632.357530] tmpfs: No value for mount option '/dev/audio#' 03:47:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='lp\x00', 0x3) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x17f, 0x163) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000100)="1b", 0x1, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x229f, 0xf401, 0x0, 0xb4) 03:47:39 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:39 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000300), 0xfd90, 0x0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendto$inet6(r0, &(0x7f0000000100), 0x0, 0xc001, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)="e694446313bf3fbb7da9fb7044d8d6bb7449171c7a0931f0465c2412cf80f5d557ceb62420f506ae868cac9ead69705ec96964f2ec4effd0c769d94debe11981cdf2a8a7994841b3bfa645b1cfa3879d6e3b1eacf164664d692f951d2d2f323df5c384294c059b4824ef9e3559e0ca12b114d17007978d7427d2427722cbd55690b6d2c53b43731d5eefeecdaf5b00f06fcb1bf690843fbc1e68cc725d256da47e593beb1f00328f79adc639bf9f8ff7a9dad39f52e0d12a1d074bd08969c4077fbc4be4a6d06f545cdea6d3024988b688bb7fe8a543e710684a830c2092d506f7a8c70b970c424e04722358f032204af7de5a7ee2fa11d17c00385fd95432ea5b4d93678dcdf0f09aca1a4e842c1570d8d53e481362d0e9f661ad20db9f7b0409c862be90feccad089349ca6bdd09b957006b3b22b62f13c721396efba767cecadb5a9bcf18f093b0e0aaa42e479b397ce0db2bf0efeb2435742523a5a2ffc4c3dc1e86162eab1431665eeecc098e7ad859d6f859b3d41bf32362699172f88a58560eb4cd837443363dd6c5d93aa3818d7b549a206040e781807d95f0dd810ab475a5007e2d6178180d3cdda9896aa51236451bffe19de27f73eb1b671f097cc2dba1bc0f4b7c51b7452f6e570b0152fb853c157f86d6a733942aa72a440f52dab3978ae8ee73147d9fa9b7a164ea737dc6b0e0eb8bbef9aa67288d38aa1274a22510b1dfa5bdf4016c6fcaa243f9b02912332397272c535f4603aef9c77f16f34b048e3df04b32eb83375cf9b740e6b6d51963499173b565ebe3856090c2e9df95e5f52ef2068a09365f0f241ce18356aca0b08888f1188205135ddd9d9781cec144eeeb30ab68cd31e46afc7c5d730edbf9988f481ff17055782d6ec1dee6488f7ef6ed60615aa8a0c10fd201d0c1f3bc48fb03cd533bac108ac1a7f3bc71743622eee36213008ec7314d39787aef46d3229765e57acba8ae2b6a0ddbc75f68976092219a29c2d11ea845fb3232ba90934ba9549dbfa323fabd51392c619109ce4b7759f2a335972262d9032b357f1df5aa280e27aa917c4a1107dd0e0968ccb9b1d0e11d1a38a670a1e82dc7a2bc4f75c46292b0d0dbfb4d3df934674a786c75f6d9f4067c8832061a06f7827e07d17334a9d12400b37d6f8f58eecfbe388e7ee1b1708bdf78288844d4b780dab9c83914c7ef40c4828a4296386356073cd0ea142d7e78798ce39c53978af30d6f570c0a5850bb19a1ca7b51c0097780673c719a89975bf52884ba20e30b777a36e6b3cba1ad1c73297ce20ebcb739d09b9c4e581713f461041c57b4b909422d38514f6112ddce864975b4ead6ef383d3ecb645938c611f9ac32069cf8749b559fb93f8fb945f5b51de634873ab7f4bc8b119f48192dc8e1f5e0f9c0978cddadef0d5e686bd89ada25b514b753b78436eaf4c3f6295570a0c39fb927ba9147b41b9f12d4b0b17f009aab928c080837436498f131d4ad0e0187212bbb940435b946fea98a755fcaadb01d5cae454b06d459bb69fd1d9745397d52262630bcd8423bfe3f5fcc3c2e8589e050167c7fcaf57cdfd9eaf36dad34c6effa0d387c5d06314e030eab55aacbd8d3e74a4d5f0a0901bb5b9b47489bed052401d74b774a5d373d55d4e31a0b115a13683f8174ce6159cccba8fa93b3a77d5fdbf132d998bc26483dfee0a0050ce30a30b49156a0c4fbfa963d4d428937537b591fe6524dac4b19c4fde980e5036902ab340bb953819d2f38357c1aa74f5ebda7435a3c88b5af48599b4ce781048e056abb678a484e21252f4c4ccdeb9b69ece762f1cc32737dbd175a5c0ed03c4872cb24349658a61cb2ffa5f54bdb41d2b854d8873b3af1d4f8e39a85716db12581de7df4c065c7c3144921e467030045d28036b1718186f24e66910c4542d6b5c8642e033fc6410ff4b00f40ea57662bfa81394344218744f1a33b7ca43d8930132cf3419fc7d673a644dd02b1d133fedfeded41d0de12db74f0056c6c484f6a74", 0x599}], 0x1, &(0x7f00000036c0)}, 0x0) [ 632.564382] tmpfs: No value for mount option '/dev/audio#' 03:47:39 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r0, &(0x7f0000000000), 0x10) write$P9_RSTAT(r0, &(0x7f0000001440)={0x52, 0x7d, 0x0, {0x0, 0x4b, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x6, '$self\\', 0x4, 'syz0', 0x4, 'syz0', 0xa, '/dev/full\x00'}}, 0x52) 03:47:39 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:39 executing program 1: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) getresuid(&(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000440)=0xe8) getuid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000006c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000740), 0x24, 0x0) syz_execute_func(&(0x7f0000000200)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @rand_addr}, 0x10) syz_execute_func(&(0x7f0000000400)="42805da0510f61e2db0595c3300dcececb9ee506158e7e0c91a33d062900770f78993d233d2341745f4a864a8680eb0a5f8dee39290fb2827d20c9c4a10dfbd6fee60f2e2121018f69d898b4c2b298220a31a3b7e2989d") 03:47:39 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:39 executing program 5: 03:47:39 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:40 executing program 5: 03:47:40 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 633.524027] tmpfs: No value for mount option '/dev/audio#' 03:47:40 executing program 5: 03:47:40 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x800000000000002, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, 0x0, 0x0) 03:47:40 executing program 5: socket$inet(0x2, 0x2a, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@local, @multicast1, @multicast1}, 0xc) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000040)={0x43}, 0x43) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:47:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x800000000000002, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x22, 0x0, 0x0) 03:47:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f0000000140)='syzkaller\x00'}, 0x48) socket$inet6(0xa, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000200)=""/143, 0x1a, 0x8f}, 0x20) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000300)) dup2(0xffffffffffffff9c, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000e80)="42805da0bd0fef69dc0f01eece73fe19fa443d0300000038211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e5417545c4010d64ac1e5d31a3b7c421f8526ffc71fb0703") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast2, @in6}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)) fstat(0xffffffffffffff9c, &(0x7f0000000700)) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getresgid(&(0x7f0000000840), &(0x7f0000000880), &(0x7f00000008c0)) getpgid(0x0) stat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000cc0)='proc\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001640)) fstat(0xffffffffffffffff, &(0x7f0000001680)) getgroups(0x0, &(0x7f0000001700)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) stat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000002a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000019c0), &(0x7f0000002ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000001480)=0xfffffffffffffdb1) lstat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)) getpid() stat(&(0x7f00000040c0)='./file0\x00', &(0x7f0000004100)) getresgid(&(0x7f0000004180), &(0x7f00000041c0), &(0x7f0000004200)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000004240)='./file0\x00', &(0x7f0000004280)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004340)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004300)='\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000004380)='./file0\x00', &(0x7f00000043c0)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004480)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004440)='keyringsystemem0^proc\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000044c0), &(0x7f0000004500)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004540)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000045c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004600), &(0x7f0000004640)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000048c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004900)={{{@in6=@mcast1, @in6=@mcast2}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000004a00)=0xe8) stat(&(0x7f0000004a40)='./file0\x00', &(0x7f0000004a80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006f00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000006ec0)="70726f632dd46e6f6465766367726f7570292340656d302a23f000"}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006f40)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000007040)=0xe8) getgroups(0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000070c0)) geteuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007100), &(0x7f0000007140)=0xc) stat(&(0x7f0000007180)='./file0\x00', &(0x7f00000071c0)) fstat(0xffffffffffffffff, &(0x7f0000007240)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000072c0)={{{@in=@remote, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000073c0)=0xe8) getgroups(0x0, &(0x7f0000007400)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007480)={{{@in=@loopback, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000007580)=0xe8) lstat(&(0x7f00000075c0)='./file0\x00', &(0x7f0000007600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000007680)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000076c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000077c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000007800)) gettid() geteuid() getresgid(&(0x7f0000007b40), &(0x7f0000007b80), &(0x7f0000007bc0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007c00)={{{@in6=@loopback, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000007d00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007d40), &(0x7f0000007d80)=0xc) gettid() geteuid() getegid() 03:47:40 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:40 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:41 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 634.498352] tmpfs: No value for mount option '/dev/audio#' 03:47:41 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:41 executing program 5: 03:47:41 executing program 5: 03:47:41 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:41 executing program 1: 03:47:41 executing program 5: 03:47:41 executing program 1: 03:47:41 executing program 5: 03:47:41 executing program 1: 03:47:41 executing program 5: 03:47:41 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:41 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 635.427615] tmpfs: No value for mount option '/dev/audio#' 03:47:42 executing program 1: 03:47:42 executing program 5: 03:47:42 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:42 executing program 1: 03:47:42 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:42 executing program 5: 03:47:42 executing program 5: 03:47:42 executing program 1: 03:47:42 executing program 1: 03:47:42 executing program 5: 03:47:42 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:42 executing program 1: 03:47:42 executing program 5: [ 636.336734] tmpfs: No value for mount option '/dev/audio#' 03:47:42 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:42 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:42 executing program 1: 03:47:43 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:43 executing program 5: 03:47:43 executing program 1: 03:47:43 executing program 5: 03:47:43 executing program 1: 03:47:43 executing program 5: 03:47:43 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:43 executing program 1: 03:47:43 executing program 5: [ 637.243671] tmpfs: No value for mount option '/dev/audio#' 03:47:43 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:43 executing program 5: 03:47:43 executing program 1: 03:47:44 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:44 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:44 executing program 1: 03:47:44 executing program 5: 03:47:44 executing program 5: 03:47:44 executing program 1: 03:47:44 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:44 executing program 5: 03:47:44 executing program 1: 03:47:44 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:44 executing program 1: 03:47:44 executing program 5: [ 638.210146] tmpfs: No value for mount option '/dev/audio#' 03:47:45 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:45 executing program 5: 03:47:45 executing program 1: 03:47:45 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:45 executing program 1: 03:47:45 executing program 5: 03:47:45 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:45 executing program 5: 03:47:45 executing program 1: [ 639.091167] tmpfs: No value for mount option '/dev/audio#' 03:47:45 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:45 executing program 1: 03:47:45 executing program 5: 03:47:45 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:45 executing program 5: 03:47:45 executing program 1: 03:47:45 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:46 executing program 1: 03:47:46 executing program 5: 03:47:46 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:46 executing program 1: 03:47:46 executing program 5: [ 640.006254] tmpfs: No value for mount option '/dev/audio#' 03:47:46 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:46 executing program 1: 03:47:46 executing program 5: 03:47:46 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:46 executing program 5: 03:47:46 executing program 1: 03:47:46 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:46 executing program 1: 03:47:46 executing program 5: 03:47:47 executing program 5: 03:47:47 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:47 executing program 1: [ 640.906572] tmpfs: No value for mount option '/dev/audio#' 03:47:47 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:47 executing program 5: 03:47:47 executing program 1: 03:47:47 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:47 executing program 1: 03:47:47 executing program 5: 03:47:47 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:47 executing program 1: 03:47:47 executing program 5: 03:47:48 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:48 executing program 1: 03:47:48 executing program 5: [ 641.786982] tmpfs: No value for mount option '/dev/audio#' 03:47:48 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:48 executing program 1: 03:47:48 executing program 5: 03:47:48 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:48 executing program 5: 03:47:48 executing program 1: 03:47:48 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:48 executing program 1: 03:47:48 executing program 5: 03:47:49 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:49 executing program 1: 03:47:49 executing program 5: [ 642.725297] tmpfs: No value for mount option '/dev/audio#' 03:47:49 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:49 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:49 executing program 1: 03:47:49 executing program 5: 03:47:49 executing program 5: 03:47:49 executing program 1: 03:47:49 executing program 5: 03:47:49 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:49 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:50 executing program 1: 03:47:50 executing program 5: 03:47:50 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 643.606977] tmpfs: No value for mount option '/dev/audio#' 03:47:50 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:50 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:50 executing program 5: 03:47:50 executing program 1: 03:47:50 executing program 5: 03:47:50 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) 03:47:50 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") [ 643.847437] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 03:47:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x0, @loopback}}}, &(0x7f0000000180)=0x84) madvise(&(0x7f0000c24000/0x3000)=nil, 0x3000, 0x4000000000000008) clone(0x0, &(0x7f0000000240), &(0x7f0000001ffc), &(0x7f00000001c0), &(0x7f0000000040)) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) 03:47:50 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:50 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:50 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:50 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 644.479912] tmpfs: No value for mount option '/dev/audio#' 03:47:51 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:51 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:47:51 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:51 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") 03:47:51 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) 03:47:51 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:51 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") [ 645.019351] audit: type=1326 audit(1536896871.563:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19279 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:47:51 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") [ 645.277098] audit: type=1326 audit(1536896871.823:54): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19287 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:47:51 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:52 executing program 2: mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='reiserfs\x00', 0x0, &(0x7f0000000200)='\x00') eventfd(0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0xf7, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000400)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) inotify_init() write(0xffffffffffffffff, &(0x7f0000000440), 0x0) syz_execute_func(&(0x7f00000002c0)="c4a17dd7f1805da06a0f460f46dc0f01eec4613f2a8b008000008600d7cb66662626660f69b2000000002900c4e1985f560cc4623bf78b0a0000000f99583d2350230606eaf3ce0f53cfc422f1be222179660f38302f3e26f043108900000000450f2e628af554e1c4c4a24da93349f7d6adbe90dfe2987e") [ 645.435267] tmpfs: No value for mount option '/dev/audio#' 03:47:52 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 645.509041] audit: type=1326 audit(1536896872.053:55): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19299 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:47:52 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:47:52 executing program 2: shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000a40), 0x4) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x3) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000a80)={0x7, 0xeb}) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x71a8, [], [], [], 0x0, 0x0, 0x0, 0x0, "b4db5ee462a71df8fa5d18888301d878"}) 03:47:52 executing program 1: clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@multicast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in6, @in=@remote}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000e40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000ec0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066410f55a4e088d557207c2a06c46129ef950000002140a564a70f157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:47:52 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:52 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 03:47:52 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 646.330264] tmpfs: No value for mount option '/dev/audio#' 03:47:52 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:53 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:47:53 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:53 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:47:53 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:47:53 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:53 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 647.275779] tmpfs: No value for mount option '/dev/audio#' 03:47:54 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:47:54 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:54 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:47:54 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:47:54 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:54 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 648.170736] tmpfs: No value for mount option '/dev/audio#' 03:47:55 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:47:55 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:55 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:47:55 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:47:55 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:55 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 649.071416] tmpfs: No value for mount option '/dev/audio#' 03:47:55 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:56 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:47:56 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:47:56 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:47:56 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:56 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 649.977444] tmpfs: No value for mount option '/dev/audio#' 03:47:56 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:56 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:47:57 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) 03:47:57 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) 03:47:57 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:57 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 650.893509] tmpfs: No value for mount option '/dev/audio#' 03:47:57 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:57 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:47:58 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) 03:47:58 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) 03:47:58 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:58 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:58 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:58 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:47:59 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) 03:47:59 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:47:59 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) 03:47:59 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:47:59 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:47:59 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:47:59 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:00 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:48:00 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:00 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:00 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:00 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:00 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:00 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:48:01 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:01 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:01 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:01 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:01 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:48:01 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:01 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:02 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:02 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:02 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:02 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:48:02 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:02 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:03 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:03 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:03 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:48:03 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) [ 657.190817] tmpfs: No value for mount option '/dev/audio#' 03:48:03 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:03 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:04 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:04 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:04 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 658.079616] tmpfs: No value for mount option '/dev/audio#' 03:48:04 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:04 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:04 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:04 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:05 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:05 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 658.991974] tmpfs: No value for mount option '/dev/audio#' 03:48:05 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:05 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:05 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:05 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:06 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:06 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 659.885882] tmpfs: No value for mount option '/dev/audio#' 03:48:06 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:06 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:06 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:06 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:06 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:07 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 660.798401] tmpfs: No value for mount option '/dev/audio#' 03:48:07 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) 03:48:07 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:07 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:07 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:07 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:08 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) 03:48:08 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 661.739484] tmpfs: No value for mount option '/dev/audio#' 03:48:08 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:08 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) 03:48:08 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) 03:48:08 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) 03:48:09 executing program 0: shmget(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) geteuid() getgid() openat$mixer(0xffffffffffffff9c, &(0x7f0000000580)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) recvfrom$packet(0xffffffffffffffff, &(0x7f00000005c0)=""/192, 0xc0, 0x0, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@loopback}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f00000004c0)) getpgrp(0x0) bind$can_raw(0xffffffffffffffff, &(0x7f0000000840), 0x10) getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000500)) keyctl$set_reqkey_keyring(0x12, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00'}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f0000000040)) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f0000000880)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000880)) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f00000008c0)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6, @local}, 0x10) futex(&(0x7f0000000ac0), 0x0, 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000900), &(0x7f0000000940)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000980), 0x10) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x18) [ 662.645867] kasan: CONFIG_KASAN_INLINE enabled 03:48:09 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in6=@mcast1}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 662.669273] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 662.728434] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 662.734728] CPU: 1 PID: 19758 Comm: syz-executor0 Not tainted 4.19.0-rc3-next-20180913+ #73 [ 662.743224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.752722] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 662.757746] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff [ 662.776655] RSP: 0018:ffff8801c09a78d8 EFLAGS: 00010206 [ 662.782026] RAX: 0000000000000000 RBX: ffff8801c09a79f8 RCX: 0000000000000006 [ 662.789382] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 662.796648] RBP: ffff8801c09a79c8 R08: ffff8801bf4e44c0 R09: fffffbfff12c24e5 [ 662.803920] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff880140976840 [ 662.811210] R13: 1ffff10038134f20 R14: 0000000000000000 R15: ffff8801c09a7adc [ 662.818499] FS: 00007fea9a274700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 662.826726] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 662.832610] CR2: 00007fea9a252db8 CR3: 00000001be675000 CR4: 00000000001406e0 [ 662.839888] Call Trace: [ 662.842497] ? user_get_super+0x250/0x250 [ 662.846770] ? down_write+0x8a/0x130 [ 662.850529] ? do_umount_root+0x218/0x320 [ 662.854679] ? down_read+0x120/0x120 [ 662.858396] do_umount_root+0x2b1/0x320 [ 662.862386] ? namespace_unlock+0x210/0x210 [ 662.866781] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 662.872384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.878014] ? ns_capable_common+0x13f/0x170 [ 662.882430] ksys_umount+0x8b6/0x1230 [ 662.886266] ? rcu_softirq_qs+0x20/0x20 [ 662.890279] ? dput.part.25+0x241/0x790 [ 662.894322] ? check_preemption_disabled+0x48/0x200 [ 662.899358] ? __detach_mounts+0x430/0x430 [ 662.903598] ? rcu_softirq_qs+0x20/0x20 [ 662.907572] ? mnt_get_count+0x150/0x150 [ 662.911644] ? dput.part.25+0x26d/0x790 [ 662.915618] ? shrink_dcache_sb+0x350/0x350 [ 662.919991] ? current_umask+0x70/0x70 [ 662.923931] ? __x64_sys_futex+0x47f/0x6a0 [ 662.928240] ? do_syscall_64+0x9a/0x820 [ 662.932217] ? do_syscall_64+0x9a/0x820 [ 662.936243] ? lockdep_hardirqs_on+0x421/0x5c0 [ 662.940853] ? trace_hardirqs_on+0xbd/0x310 [ 662.945179] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.950549] ? trace_hardirqs_off_caller+0x300/0x300 [ 662.955659] ? ksys_mount+0xa8/0x140 [ 662.959381] __x64_sys_umount+0x54/0x80 [ 662.963362] do_syscall_64+0x1b9/0x820 [ 662.967253] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 662.972645] ? syscall_return_slowpath+0x5e0/0x5e0 [ 662.977584] ? trace_hardirqs_off+0x310/0x310 [ 662.982081] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 662.987101] ? recalc_sigpending_tsk+0x180/0x180 [ 662.991939] ? kasan_check_write+0x14/0x20 [ 662.996182] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 663.001032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.006266] RIP: 0033:0x4572d9 [ 663.009460] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 663.028367] RSP: 002b:00007fea9a273c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 663.036320] RAX: ffffffffffffffda RBX: 00007fea9a2746d4 RCX: 00000000004572d9 [ 663.043591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000880 [ 663.050861] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 663.058131] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 663.065392] R13: 00000000004d7ba8 R14: 00000000004caa53 R15: 0000000000000000 [ 663.073023] Modules linked in: 03:48:09 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000002380)=0xffffffffffffff75) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 663.107589] ---[ end trace 92883667a3d44f0c ]--- [ 663.114750] kobject: 'loop3' (00000000b67bb1e2): kobject_uevent_env [ 663.119706] RIP: 0010:reconfigure_super+0x48e/0xbb0 [ 663.125489] kobject: 'loop3' (00000000b67bb1e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 663.134682] Code: 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 62 05 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 03 48 8d 78 30 48 89 f9 48 c1 e9 03 <80> 3c 11 00 0f 85 4d 05 00 00 48 8b 40 30 48 85 c0 48 89 85 20 ff 03:48:09 executing program 2: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6}}, &(0x7f0000002b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002b80)={{{@in=@broadcast, @in6=@ipv4={[], [], @local}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000002c80)=0xe8) [ 663.161938] RSP: 0018:ffff8801c09a78d8 EFLAGS: 00010206 [ 663.168420] RAX: 0000000000000000 RBX: ffff8801c09a79f8 RCX: 0000000000000006 [ 663.176420] RDX: dffffc0000000000 RSI: ffffffff81cdbc5b RDI: 0000000000000030 [ 663.184754] RBP: ffff8801c09a79c8 R08: ffff8801bf4e44c0 R09: fffffbfff12c24e5 [ 663.192308] kobject: 'loop2' (00000000784eea21): kobject_uevent_env [ 663.199508] kobject: 'loop2' (00000000784eea21): fill_kobj_path: path = '/devices/virtual/block/loop2' 03:48:09 executing program 5: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="00e04b871a37a983e2aab42bffbefcc6c0e5714136702021e299a85521bcd64ee525e3cf1bc03b01ebb42f873a25de969659ccd3b0dc342fcc98d562639fb93f7aec86fee2eb1936a92f0c75460aac3f2663a4d3e77d235aaad4326ed56de4f7ceb4d736ebf5817a886c3371e1b796ca1066f102de9acf454690b3cea8b71d86d9f43a31a2d4f20ed956a522a706054e44322203e993d4333fb21147a027380035c030fc0401dd73e472f93eed1d2cae5fee5aa6eb3cc2af5f202be39c439d130bb6cddb752d964e008e0ce9dfc1da3dca1ec5e293ccd60164918be2da610e898fcc1efa7a1665853f6639fa61765bdfb9a777396400dc70d3f175027e6e44dc7d31f28b2d82ecf39655b71a17e241f6024809371be8d76bb8055c8e9dddc13b47f5ef1493351b70fa1b6f05e2bf0767d16bf2b6fe8632e3d6b6443c411a4ebeeadaa91e3280f292d3548ee97c3833784dfabfa84a4290ebebd98ba8", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) accept4(0xffffffffffffffff, &(0x7f00000028c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x80, 0x0) 03:48:09 executing program 1: socket$inet_tcp(0x2, 0xa, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003940)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000000c0)) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) memfd_create(&(0x7f0000000180)="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", 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000900)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @multicast1, @loopback}, &(0x7f0000000a00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002040)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000020c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002140)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in=@rand_addr}}}, &(0x7f0000002280)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002540)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000026c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002880)=0xe8) [ 663.215683] R10: fffffbfff12c24e5 R11: ffffffff8961272b R12: ffff880140976840 [ 663.217548] kobject: 'loop5' (00000000cc717386): kobject_uevent_env [ 663.230488] kobject: 'loop5' (00000000cc717386): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 663.241071] kobject: 'loop1' (00000000e6cfdf4a): kobject_uevent_env 03:48:09 executing program 4: syz_emit_ethernet(0x0, &(0x7f0000000240)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000004c0)) signalfd(0xffffffffffffffff, &(0x7f0000008380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000040)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000007f80), 0x0, 0x0, &(0x7f0000008200)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008240)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008280)={'rose0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000082c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000008300)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008440)={{{@in6=@dev, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@dev}}, &(0x7f0000008540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008580)={{{@in6=@local, @in6}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000008680)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000009cc0)={@multicast1, @multicast1}, &(0x7f0000009d00)=0xc) accept(0xffffffffffffffff, &(0x7f0000009d40)=@can, &(0x7f0000009dc0)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008700)={0x0, @remote, @dev}, &(0x7f00000086c0)=0xbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009e80)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000009f80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009fc0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f000000a0c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a140)={@mcast2}, &(0x7f000000a180)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000a2c0)={@local}, &(0x7f000000a300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}}}, &(0x7f000000a480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000a640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a6c0), &(0x7f000000a700)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000da80), &(0x7f000000dac0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f000000dbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000dc00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f000000dc40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000dc80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000dd40)={'ip6tnl0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000de80)={{{@in=@local, @in6=@ipv4={[], [], @local}}}, {{@in6=@ipv4}, 0x0, @in6=@remote}}, &(0x7f000000df80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000dfc0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f000000e0c0)=0xe8) [ 663.258174] kobject: 'loop1' (00000000e6cfdf4a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 663.261075] R13: 1ffff10038134f20 R14: 0000000000000000 R15: ffff8801c09a7adc [ 663.281701] FS: 00007fea9a274700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 663.290839] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 663.297025] CR2: 00007f030ea8b000 CR3: 00000001be675000 CR4: 00000000001406e0 03:48:09 executing program 3: clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000680)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x28, &(0x7f00000052c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700), 0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) add_key(&(0x7f0000000740)='syzkaller\x00', &(0x7f0000000800), &(0x7f0000000940), 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000500)='encrypted\x00', &(0x7f0000000540), &(0x7f0000000240), 0x0, 0x0) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000380), 0x0, 0x3db, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', 0x0) getresuid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000001d40)) stat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000001dc0)) stat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) geteuid() lstat(&(0x7f0000002480)='./file0\x00', &(0x7f00000024c0)) getgid() stat(&(0x7f0000002680)='./file0\x00', &(0x7f00000026c0)) getresuid(&(0x7f0000002e40), &(0x7f0000002e80), &(0x7f0000002ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f00), &(0x7f0000002f40)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000003140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003180), &(0x7f00000031c0)=0xc) geteuid() getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) [ 663.327106] kobject: 'loop4' (00000000ff670f52): kobject_uevent_env [ 663.333761] kobject: 'loop4' (00000000ff670f52): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 663.365548] Kernel panic - not syncing: Fatal exception [ 663.371958] Kernel Offset: disabled [ 663.375600] Rebooting in 86400 seconds..