="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 03:33:42 executing program 4: get_robust_list(0x0, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f00000000c0), 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f00000004c0)=0x18) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000680)='attr/sockcreate\x00') dup(0xffffffffffffffff) creat(&(0x7f0000000a80)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) getgroups(0x0, &(0x7f0000001440)) getuid() getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) getuid() getegid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@mcast2, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000003000)=0xe8) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003200)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000003300)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000b40)='nrtype\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b80)) eventfd(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000680)="428055a032b6b6c4e1785a7104ff0f183736e33a85ddd2d2d5f2a60e0e097002660f3838d69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6feefac4e14bc22a49052d052de119fddd4008356d0000000000753241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c441dc14c96767f340a4212dfca50000262666430ffb348b1f7f") 03:33:42 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) mount(&(0x7f00000002c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce23db20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e8a1b357bb4ef73a9682c9fa2ed031465aa191df822f764297cba22a8499d177f49fba940f55ba88b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000000)="a899c924ef79f61e384990610decf7166ae8d4c4568900f24c6a0bc9660103e87e003e2e8e2eaa8ca7de7b1a8d2ac0065903547921ffd217497bf9b8711786108f9896c27dad7ef5b47882cd32300c01afce06e992f75264c0da620b4d9b4ee60359c5393f8ee97f218111ea31cb05b62c6e593bfdf9457ef922820548ee727899e24de5255b1e8c571c8837dee1a109d461df9223") eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) rmdir(&(0x7f0000000100)='./file2\x00') link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:33:42 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000003080)=0xffffffffffffff99) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003440)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) stat(&(0x7f0000003540)='./bus\x00', &(0x7f0000003580)) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004fc0)='./bus\x00', &(0x7f0000005000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:42 executing program 4: get_robust_list(0x0, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f00000000c0), 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f00000004c0)=0x18) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000680)='attr/sockcreate\x00') dup(0xffffffffffffffff) creat(&(0x7f0000000a80)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) getgroups(0x0, &(0x7f0000001440)) getuid() getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) getuid() getegid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@mcast2, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000003000)=0xe8) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003200)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000003300)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000b40)='nrtype\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b80)) eventfd(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000680)="428055a032b6b6c4e1785a7104ff0f183736e33a85ddd2d2d5f2a60e0e097002660f3838d69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6feefac4e14bc22a49052d052de119fddd4008356d0000000000753241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c441dc14c96767f340a4212dfca50000262666430ffb348b1f7f") 03:33:42 executing program 4: get_robust_list(0x0, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f00000000c0), 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f00000004c0)=0x18) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000680)='attr/sockcreate\x00') dup(0xffffffffffffffff) creat(&(0x7f0000000a80)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) getgroups(0x0, &(0x7f0000001440)) getuid() getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) getuid() getegid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@mcast2, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000003000)=0xe8) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003200)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000003300)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000b40)='nrtype\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b80)) eventfd(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000680)="428055a032b6b6c4e1785a7104ff0f183736e33a85ddd2d2d5f2a60e0e097002660f3838d69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6feefac4e14bc22a49052d052de119fddd4008356d0000000000753241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c441dc14c96767f340a4212dfca50000262666430ffb348b1f7f") 03:33:43 executing program 4: get_robust_list(0x0, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f00000000c0), 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f00000004c0)=0x18) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000680)='attr/sockcreate\x00') dup(0xffffffffffffffff) creat(&(0x7f0000000a80)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000001400)=0xe8) getgroups(0x0, &(0x7f0000001440)) getuid() getresgid(&(0x7f00000016c0), &(0x7f0000001700), &(0x7f0000001740)) getuid() getegid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) getgroups(0x0, &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@mcast2, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000003000)=0xe8) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) geteuid() stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003200)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000003300)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000b40)='nrtype\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b80)) eventfd(0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000680)="428055a032b6b6c4e1785a7104ff0f183736e33a85ddd2d2d5f2a60e0e097002660f3838d69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6feefac4e14bc22a49052d052de119fddd4008356d0000000000753241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c441dc14c96767f340a4212dfca50000262666430ffb348b1f7f") 03:33:43 executing program 4: ustat(0x0, &(0x7f0000000340)) accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14, 0x0) futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000400)='./file0\x00') creat(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000240)) stat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000380)) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getpid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[]}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000440)="42805da0ad5252ef84dc0f01eece660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac46667f08192d30500000f0031a3b744dbe266440f2eb6f19ea5e30721") 03:33:43 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000003080)=0xffffffffffffff99) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003440)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) stat(&(0x7f0000003540)='./bus\x00', &(0x7f0000003580)) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004fc0)='./bus\x00', &(0x7f0000005000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:43 executing program 0: timerfd_create(0x0, 0x80803) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000c40)) getpid() getpgid(0x0) accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f00000002c0)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000080), 0x4) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000300)) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 03:33:44 executing program 0: keyctl$session_to_parent(0x12) syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0d10fef69dc0d01ee660f3a6086000866450f382167033591913d062900770f78996b2179660f38302fc401fe5b7aa9e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") pipe(&(0x7f00000000c0)) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) [ 3236.095438] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.110326] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.117774] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.125049] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.132978] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.139825] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.147307] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.154511] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.161596] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.168479] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.175532] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 3236.183852] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz1 03:33:45 executing program 4: memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:45 executing program 2: link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') rt_sigaction(0x0, &(0x7f0000000b40)={&(0x7f0000000540)="8fa97883c52e46ae0f18c3ac650a1af20f517b7c400f85090000008f6978e216c4c121568caa080000002ef344d9f1", {}, 0x0, &(0x7f0000000b00)="c462791e9200000000c4231518752b00660fc5f8830f760bc4a1fc51a49507000000f20f7c9800000000660f5b07430fd1d0664a0f7e4cdcdc440faeed"}, &(0x7f0000000c00)={&(0x7f0000000b80)="430faeebf345ab2646dada440fea268f492091f58fa8108f8800000000f5c4a1d012e1d0ab000000002ef3db5ecfc463ed7d1930", {}, 0x0, &(0x7f0000000bc0)="40f609cf26410f812c0000006640aac4c3397ba048000000fef242a5c4813858cbc463390b5ffc0fc4037d05d00c660f3a0b6c4e210a8f09889584ec04000000"}, 0x8, &(0x7f0000000c40)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/access\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000900)='/dev/rtc0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000740)=""/169) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) syz_execute_func(&(0x7f0000000a00)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000002c0), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[]}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) link(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='./file0\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[]}}, 0x0) request_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000300), &(0x7f0000000340)='IPVS\x00', 0xffffffffffffffff) add_key(&(0x7f00000003c0)='syzkaller\x00', &(0x7f0000000400), &(0x7f00000004c0), 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f00000005c0), &(0x7f0000000600)='*\x00', 0xfffffffffffffffe) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000009c0)={'raw\x00'}, &(0x7f00000001c0)=0x24) keyctl$dh_compute(0x17, &(0x7f0000000640), &(0x7f0000000680)=""/93, 0x5d, &(0x7f0000000800)={&(0x7f0000000700)={'sm4\x00'}, &(0x7f0000000740)}) 03:33:45 executing program 5: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001700)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() fstat(0xffffffffffffffff, &(0x7f0000002a00)) getegid() getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a80)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002b80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000003080)=0xffffffffffffff99) lstat(&(0x7f00000030c0)='./bus\x00', &(0x7f0000003100)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000031c0)={{{@in6=@dev, @in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003300), &(0x7f0000003340)=0xc) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000003380)='./bus\x00', &(0x7f00000033c0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003440)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003500)) stat(&(0x7f0000003540)='./bus\x00', &(0x7f0000003580)) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000004fc0)='./bus\x00', &(0x7f0000005000)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:45 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) mount(&(0x7f00000002c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce23db20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e8a1b357bb4ef73a9682c9fa2ed031465aa191df822f764297cba22a8499d177f49fba940f55ba88b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000000)="a899c924ef79f61e384990610decf7166ae8d4c4568900f24c6a0bc9660103e87e003e2e8e2eaa8ca7de7b1a8d2ac0065903547921ffd217497bf9b8711786108f9896c27dad7ef5b47882cd32300c01afce06e992f75264c0da620b4d9b4ee60359c5393f8ee97f218111ea31cb05b62c6e593bfdf9457ef922820548ee727899e24de5255b1e8c571c8837dee1a109d461df9223") eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0xffffffffffffff1a, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000600)) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) rmdir(&(0x7f0000000100)='./file2\x00') link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:33:45 executing program 0: futex(&(0x7f0000000440), 0x4, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f00000002c0), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffff9c, &(0x7f0000002a80), 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 03:33:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x2f, &(0x7f0000000480)=0x3, 0x4) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffff8) r1 = getpgid(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f00000004c0)=0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:45 executing program 0: timer_create(0x0, &(0x7f0000000180)={0x0, 0x38}, &(0x7f0000000140)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) ppoll(&(0x7f0000000080), 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0), 0x8) 03:33:45 executing program 0: ioprio_set$uid(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x58de4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffe42, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f00000005c0)={{}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) rmdir(&(0x7f0000000300)='./file0\x00') epoll_create(0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000580)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) prctl$setptracer(0x59616d61, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00'}) ustat(0x0, &(0x7f0000000140)) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'U+', 0x10000}, 0x28, 0x0) 03:33:46 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f00000000c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) creat(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000e00)={0x0, &(0x7f0000000dc0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) lstat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000a00)) getgroups(0x0, &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getegid() getegid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000cc0)=0xc) setgroups(0x0, &(0x7f0000000d00)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000280)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @mcast2}}, 0x0, 0x0, 0x0, "1920f619f59f4a24c2ff079e4791620ecbd84ea1afac415e3ca410c3a7ff16a003595bfade3f71fc7ca0f1786f60cba1039dc2609b00386d39c61c3f29e334272da125dd3e67f7517e11801e0b1000"}, 0xd8) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000600), 0xffffffffffffffff) recvmsg(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000000200)=@alg, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000840)=""/45, 0x2d}, 0x0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000540)={0x0, &(0x7f0000000180)}, 0x10) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000480)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) utime(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:33:46 executing program 4: memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:46 executing program 0: timerfd_create(0x7, 0x0) memfd_create(&(0x7f00000000c0)='}%!\x00', 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c40)) getresuid(&(0x7f0000002c80), &(0x7f0000002cc0), &(0x7f0000002d00)) stat(&(0x7f0000002d40)='./file0\x00', &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002e00)) getuid() fstat(0xffffffffffffffff, &(0x7f0000002e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f00)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000003000)=0xe8) getgroups(0x0, &(0x7f0000003040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003080)) ioctl$EVIOCGPROP(0xffffffffffffffff, 0x80404509, &(0x7f00000006c0)=""/180) fstat(0xffffffffffffffff, &(0x7f00000030c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003140), &(0x7f0000003180)=0xc) getpid() setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000340)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000044c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000045c0)=0xe8) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/14, 0xe, 0x0, &(0x7f0000000180)=@ethernet={0x0, @dev}, 0x80) getgroups(0x0, &(0x7f0000004600)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000004640)='./file0\x00', &(0x7f0000004680)) getegid() syz_execute_func(&(0x7f0000000200)="428055a03bfbfb69203737c3397c05bd060f3821440f8b0600000064a70f157a9e40b63a01f7c4a211b62c5e62010d42002e660fe095000000003ef0f6585501f245db850000000085c4227992dd289f") 03:33:46 executing program 4: memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:47 executing program 5: setrlimit(0x0, &(0x7f00000000c0)) pipe2(&(0x7f0000000400), 0x0) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000380), &(0x7f0000000440)="2f030000000000000055ee5b82773c5a8defcc37bbfec4fa4d7ffaa3f31c62f9be18945a4739921d168de7124fda0bdd9e", 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000400), 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0xf9b9e7d2c4742a6f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) eventfd(0x0) pivot_root(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000300)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000003c0)) getpgrp(0x0) creat(&(0x7f0000000500)='./file0/file0\x00', 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000540), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) faccessat(0xffffffffffffffff, &(0x7f0000000580)='./file0/file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast2}, &(0x7f0000000340)=0x10) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000600)) syz_execute_func(&(0x7f00000005c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) 03:33:47 executing program 2: setrlimit(0xb, &(0x7f0000000200)={0x0, 0xffffffffffff73a7}) keyctl$set_reqkey_keyring(0x4, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000740)=""/167, &(0x7f0000000600)=0xa7) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340), &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 03:33:47 executing program 5: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000380)}) memfd_create(&(0x7f0000000380)='ah\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a00)={@remote}, &(0x7f0000000a40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000a80)={'tunl0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003a80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b80)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000003c00)=0xb9) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000003c40)={@broadcast, @local}, &(0x7f0000003c80)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000005040), &(0x7f0000005080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000050c0)={@dev, @broadcast}, &(0x7f0000005100)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005140)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000005240)=0xe8) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000052c0)=@req={0x28, &(0x7f0000005280)={'lo\x00', @ifru_addrs=@xdp}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005340)={{{@in6, @in=@dev}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000005440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000059c0), &(0x7f0000005a00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005a40)={@loopback}, &(0x7f00000007c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005ac0)={@local, @loopback}, &(0x7f0000005b00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005b40), &(0x7f0000005b80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005f80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005fc0)={0x0, @local, @dev}, &(0x7f0000006000)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000006040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000061c0)={@multicast2, @loopback}, &(0x7f0000006200)=0xc) accept(0xffffffffffffff9c, &(0x7f0000006300)=@hci, &(0x7f0000006380)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x9a) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000f940)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f000000fa40)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000010300)={&(0x7f0000000600), 0xc, &(0x7f00000102c0)={&(0x7f0000000b80)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000001c0)) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000200)={'ah\x00'}, &(0x7f0000000240)=0x1e) pipe(&(0x7f0000000280)) getpeername$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @remote}, &(0x7f0000000300)=0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "4815bdeff0f66df0525c7b19ce3c017536ea16bd341332968e6e664cf18f62e88aad46be995a94a977a3f881149f51affb88a76efd29c29b3333db4acdd565f67aec3c3fbc804c87c0a0618b6010238a"}, 0xd8) 03:33:47 executing program 4: memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:48 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x80) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001900)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001940)={{{@in=@dev, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000001a40)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:48 executing program 3: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open(&(0x7f0000000100)='./file0/file1\x00', 0x0, 0x0) munmap(&(0x7f00006db000/0x1000)=nil, 0x1000) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) 03:33:48 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000006c0)={'nat\x00'}, &(0x7f0000000740)=0x54) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000003c0)=0xc) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) getegid() prctl$seccomp(0x16, 0x0, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000580)={'veth0_to_bridge\x00', {0x2, 0x0, @dev}}) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:33:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @loopback}}) 03:33:48 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:48 executing program 4: ppoll(&(0x7f0000000340), 0x2000000000000302, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040)={0xfffffffffffffffc}, 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000005c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in, @in6=@mcast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xca) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@multicast1, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410f33eefafa2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:48 executing program 0: msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0), 0x5, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0x80e85411, &(0x7f00000004c0)=""/241) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) syz_execute_func(&(0x7f0000001740)="428055a03b6969ef69dc00d9cff3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f65855019131a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) accept$unix(0xffffffffffffff9c, &(0x7f0000000c80), &(0x7f0000000d00)=0x6e) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/create\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000480)=0x1c) epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") 03:33:48 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 2: setrlimit(0xb, &(0x7f0000000200)={0x0, 0xffffffffffff73a7}) keyctl$set_reqkey_keyring(0x4, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000740)=""/167, &(0x7f0000000600)=0xa7) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340), &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 03:33:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 2: setrlimit(0xb, &(0x7f0000000200)={0x0, 0xffffffffffff73a7}) keyctl$set_reqkey_keyring(0x4, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000740)=""/167, &(0x7f0000000600)=0xa7) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340), &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 03:33:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 5: chroot(&(0x7f0000000340)='./file0\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00'}, 0x10) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000440), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000ac0)) geteuid() getgid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@dev, @in=@multicast1}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001cc0)=0xe8) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004d80), &(0x7f0000004dc0)=0xc) getresgid(&(0x7f0000004e00), &(0x7f0000004e40), &(0x7f0000004e80)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000004f80)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000004fc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005000)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000005100)=0xe8) getresgid(&(0x7f0000005140), &(0x7f0000005180), &(0x7f00000051c0)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000005200)) getegid() getpgid(0xffffffffffffffff) getuid() stat(&(0x7f0000005280)='./file0\x00', &(0x7f00000052c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005440), 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f00000003c0)='cifs.idmap\x00', 0xffffffffffffffff}, 0x30) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "1ed80a039e270c23027eb3c58a8bc421ae74039212c11ee34390b7b38648dac3"}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000003c0)) epoll_create(0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") flock(0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) 03:33:49 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:49 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000004c0)) timer_create(0x0, &(0x7f0000000800), &(0x7f0000000500)) timer_delete(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0a10fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f7f") mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) geteuid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() getgroups(0x1923564a7a58af82, &(0x7f0000000940)) getpeername(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/load\x00', 0x2, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) fchmod(0xffffffffffffffff, 0x0) getpid() timer_create(0x0, &(0x7f0000000840), &(0x7f0000000880)) timer_gettime(0x0, &(0x7f0000000140)) 03:33:49 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:50 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:50 executing program 4: eventfd2(0x0, 0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000b80)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@local, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000680)={0x0, @rand_addr, @multicast2}, &(0x7f00000006c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'eql\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003bc0), &(0x7f0000003c00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003c40)={@local, @multicast2}, &(0x7f0000003c80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000003d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003dc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003e40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f00)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003f40)={@rand_addr, @remote}, &(0x7f0000003f80)=0xc) recvmsg(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000003fc0)=@can, 0x80, &(0x7f0000004200), 0x0, &(0x7f0000004240)=""/124, 0x7c}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004300)={@remote}, &(0x7f0000004340)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004780)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004fc0)={&(0x7f00000001c0), 0xc, &(0x7f0000004f80)={&(0x7f00000047c0)={0x14}, 0x14}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) 03:33:50 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:50 executing program 0: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000180), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000200)) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) getresuid(&(0x7f0000000540), &(0x7f0000000600), &(0x7f0000000640)) fstat(0xffffffffffffffff, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da0124fefeddc0fc4e3f57d7104dba873fe19fa380f1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:33:50 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)=')vboxnet1userlosystem\x00', 0xffffffffffffff9c}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000300)={'syzkaller0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:50 executing program 2: setrlimit(0xb, &(0x7f0000000200)={0x0, 0xffffffffffff73a7}) keyctl$set_reqkey_keyring(0x4, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000740)=""/167, &(0x7f0000000600)=0xa7) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000340), &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in6=@loopback}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0x4) 03:33:50 executing program 5: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x0, 0x0) getsockname$netlink(0xffffffffffffffff, &(0x7f00000012c0), &(0x7f0000001300)=0xc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f00000001c0)={@local, @remote}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:51 executing program 4: eventfd2(0x0, 0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000b80)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@local, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000680)={0x0, @rand_addr, @multicast2}, &(0x7f00000006c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'eql\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003bc0), &(0x7f0000003c00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003c40)={@local, @multicast2}, &(0x7f0000003c80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000003d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003dc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003e40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f00)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003f40)={@rand_addr, @remote}, &(0x7f0000003f80)=0xc) recvmsg(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000003fc0)=@can, 0x80, &(0x7f0000004200), 0x0, &(0x7f0000004240)=""/124, 0x7c}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004300)={@remote}, &(0x7f0000004340)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004780)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004fc0)={&(0x7f00000001c0), 0xc, &(0x7f0000004f80)={&(0x7f00000047c0)={0x14}, 0x14}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) 03:33:51 executing program 0: signalfd(0xffffffffffffff9c, &(0x7f0000000380), 0x8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000580)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000340)={"6070767100000000f4ff00"}, &(0x7f00000005c0)=0x1e) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe(&(0x7f00000004c0)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000018c0)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001900)=@can, &(0x7f0000001980)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000019c0)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b40)=0x14) accept(0xffffffffffffffff, &(0x7f0000001b80)=@can, &(0x7f0000001c00)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001c40)={0x0, @broadcast, @broadcast}, &(0x7f0000001c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e80)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005380)={@loopback}, &(0x7f00000053c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005440)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005480)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000005580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005680)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000005780)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000057c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005840)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000005940)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000059c0)={'eql\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005a00)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@loopback}}, &(0x7f0000005b00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005b40)={0x0, @loopback, @rand_addr}, &(0x7f0000005b80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005bc0)={{{@in=@multicast2, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000005cc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006480)={&(0x7f0000000500), 0xc, &(0x7f0000006440)={&(0x7f0000005d00)={0x14}, 0x14}}, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000010a80)={{{@in=@remote, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000010b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000010bc0)={{{@in6=@local, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000010cc0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d00)={0x0, @dev, @broadcast}, &(0x7f0000010d40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d80)={0x0, @rand_addr, @dev}, &(0x7f0000010dc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000010f80)={&(0x7f00000002c0), 0xc, &(0x7f0000010f40)={&(0x7f0000010e00)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x4) syz_execute_func(&(0x7f0000000380)="42805da0c70f854f26000073fe19fa400f1822420fc70b1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179467aa2e541440f815d9d00000f2efb1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:33:52 executing program 5: socketpair(0x0, 0xe, 0x0, &(0x7f00000003c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000340)={'TPROXY\x00'}, &(0x7f0000000380)=0x1e) memfd_create(&(0x7f0000000180)='\x00', 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000002c0)={@loopback}, 0x14) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000780)=0x4) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x34f, 0x0, 0x0) poll(&(0x7f0000000200), 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000007c0)={0x0, @remote, @rand_addr}, &(0x7f0000000800)=0xc) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000300)) fstatfs(0xffffffffffffffff, &(0x7f00000080c0)=""/210) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'U-', 0x7}, 0x28, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:52 executing program 4: eventfd2(0x0, 0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000b80)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@local, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000680)={0x0, @rand_addr, @multicast2}, &(0x7f00000006c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'eql\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003bc0), &(0x7f0000003c00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003c40)={@local, @multicast2}, &(0x7f0000003c80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000003d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003dc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003e40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f00)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003f40)={@rand_addr, @remote}, &(0x7f0000003f80)=0xc) recvmsg(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000003fc0)=@can, 0x80, &(0x7f0000004200), 0x0, &(0x7f0000004240)=""/124, 0x7c}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004300)={@remote}, &(0x7f0000004340)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004780)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004fc0)={&(0x7f00000001c0), 0xc, &(0x7f0000004f80)={&(0x7f00000047c0)={0x14}, 0x14}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) 03:33:53 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:53 executing program 4: eventfd2(0x0, 0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) timer_create(0x0, &(0x7f0000000b40)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000b80)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000480)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@local, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000680)={0x0, @rand_addr, @multicast2}, &(0x7f00000006c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'eql\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800), &(0x7f0000000840)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003bc0), &(0x7f0000003c00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003c40)={@local, @multicast2}, &(0x7f0000003c80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000003d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003dc0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003e40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f00)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003f40)={@rand_addr, @remote}, &(0x7f0000003f80)=0xc) recvmsg(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f0000003fc0)=@can, 0x80, &(0x7f0000004200), 0x0, &(0x7f0000004240)=""/124, 0x7c}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004300)={@remote}, &(0x7f0000004340)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004780)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000004fc0)={&(0x7f00000001c0), 0xc, &(0x7f0000004f80)={&(0x7f00000047c0)={0x14}, 0x14}}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) 03:33:53 executing program 5: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000140)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) getpgrp(0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003200)={{{@in=@multicast1}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000003300)=0xe8) getegid() ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003340)) fstat(0xffffffffffffffff, &(0x7f0000003380)) 03:33:53 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0), &(0x7f0000000240), 0x0, 0xffffffffffffffff) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x0, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0xb) 03:33:53 executing program 2: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x20000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpgid(0x0) fstat(0xffffffffffffff9c, &(0x7f0000000480)) getgid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000500)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) getegid() openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/user\x00', 0x2, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000007c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='cpu.stat\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000840)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000940)='/dev/full\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)={&(0x7f0000000a40)='./file0\x00'}, 0x10) accept(0xffffffffffffff9c, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) socket$nl_generic(0x10, 0x3, 0x10) timerfd_create(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f40)) stat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getgid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001200)=0xe8) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001300)) inotify_init() signalfd4(0xffffffffffffff9c, &(0x7f0000001340), 0x8, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000001380)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000013c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@dev}}}, &(0x7f0000001500)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001540)) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgid() epoll_create1(0x0) pipe2(&(0x7f0000001640), 0x0) 03:33:53 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x15, 0x0, 0x0, "3024a6b275b602fc7317912458e4b178"}, 0x15, 0x0) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000006c0)=0xc) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in=@dev, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001200)=0xe8) getgroups(0x0, &(0x7f0000001240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001280)) getuid() lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getpid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001500)="24805e00", 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@remote}}}, &(0x7f0000001680)=0xe8) lstat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) getresgid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001d40)) stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f40), &(0x7f0000001f80)=0xc) lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) gettid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) getresuid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)) getgroups(0x0, &(0x7f0000002740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) lstat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) lstat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002a00)) getresuid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getresgid(&(0x7f0000002c00), &(0x7f0000002c40), &(0x7f0000002c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003140)) lstat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) getresgid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003300)) lstat(&(0x7f0000003340)='./file0\x00', &(0x7f0000003380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:53 executing program 5: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000140)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) getpgrp(0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003200)={{{@in=@multicast1}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000003300)=0xe8) getegid() ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003340)) fstat(0xffffffffffffffff, &(0x7f0000003380)) 03:33:53 executing program 4: keyctl$invalidate(0x15, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x7f, &(0x7f0000000140)=""/127}, 0x48) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000003c0)) stat(&(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xfffffffffffffda6) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000200)='syz1\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc364134aa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f99197a077966c463fd7998b400ba000079aaff43d0c4a145f8170f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:54 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x15, 0x0, 0x0, "3024a6b275b602fc7317912458e4b178"}, 0x15, 0x0) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000006c0)=0xc) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in=@dev, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001200)=0xe8) getgroups(0x0, &(0x7f0000001240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001280)) getuid() lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getpid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001500)="24805e00", 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@remote}}}, &(0x7f0000001680)=0xe8) lstat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) getresgid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001d40)) stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f40), &(0x7f0000001f80)=0xc) lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) gettid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) getresuid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)) getgroups(0x0, &(0x7f0000002740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) lstat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) lstat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002a00)) getresuid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getresgid(&(0x7f0000002c00), &(0x7f0000002c40), &(0x7f0000002c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003140)) lstat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) getresgid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003300)) lstat(&(0x7f0000003340)='./file0\x00', &(0x7f0000003380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:54 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x15, 0x0, 0x0, "3024a6b275b602fc7317912458e4b178"}, 0x15, 0x0) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000006c0)=0xc) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in=@dev, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001200)=0xe8) getgroups(0x0, &(0x7f0000001240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001280)) getuid() lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getpid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001500)="24805e00", 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@remote}}}, &(0x7f0000001680)=0xe8) lstat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) getresgid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001d40)) stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f40), &(0x7f0000001f80)=0xc) lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) gettid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) getresuid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)) getgroups(0x0, &(0x7f0000002740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) lstat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) lstat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002a00)) getresuid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getresgid(&(0x7f0000002c00), &(0x7f0000002c40), &(0x7f0000002c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003140)) lstat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) getresgid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003300)) lstat(&(0x7f0000003340)='./file0\x00', &(0x7f0000003380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:54 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) socket$nl_route(0x10, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x15, 0x0, 0x0, "3024a6b275b602fc7317912458e4b178"}, 0x15, 0x0) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f00000006c0)=0xc) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) stat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in=@dev, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001200)=0xe8) getgroups(0x0, &(0x7f0000001240)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001280)) getuid() lstat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getpid() stat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000001500)="24805e00", 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@remote}}}, &(0x7f0000001680)=0xe8) lstat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000001780), &(0x7f00000017c0), &(0x7f0000001800)) getresgid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001d40)) stat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f40), &(0x7f0000001f80)=0xc) lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) gettid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) getresuid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)) getgroups(0x0, &(0x7f0000002740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002780)) lstat(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)) lstat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002a00)) getresuid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000002b00)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getresgid(&(0x7f0000002c00), &(0x7f0000002c40), &(0x7f0000002c80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002cc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003140)) lstat(&(0x7f0000003180)='./file0\x00', &(0x7f00000031c0)) getresgid(&(0x7f0000003240), &(0x7f0000003280), &(0x7f00000032c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003300)) lstat(&(0x7f0000003340)='./file0\x00', &(0x7f0000003380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003400), &(0x7f0000003440)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuacct.usage_sys\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:54 executing program 0: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x619d8f38}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) lgetxattr(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f00000008c0)=""/4096, 0x1000) fcntl$setlease(r1, 0x400, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") [ 3246.277710] device lo entered promiscuous mode 03:33:54 executing program 0: setpriority(0x0, 0x0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x14) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000500), 0x4) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000880)={@multicast1, @local}, &(0x7f0000000940)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000a00)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000a40)=@can, &(0x7f0000000ac0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@multicast1}}, &(0x7f0000000e00)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000fc0), &(0x7f0000001000)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000011c0)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f00000012c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000013c0)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f00000014c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001580)={{{@in6=@dev, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000001680)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000016c0)={0x0, @empty, @broadcast}, &(0x7f0000001700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001740)={{{@in=@multicast1, @in6=@local}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001840)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001880)={'veth1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000018c0)={0x0, @remote, @dev}, &(0x7f0000001900)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001940)={@multicast1, @broadcast}, &(0x7f0000001980)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001b40)={@multicast2, @rand_addr}, &(0x7f0000001b80)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002380)={&(0x7f0000000300), 0xc, &(0x7f0000002340)={&(0x7f0000001bc0)={0x14}, 0x14}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000580), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f0000000040)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)=@getqdisc={0x24}, 0x24}}, 0x0) unshare(0x0) creat(&(0x7f0000000180)='./file0\x00', 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f00000001c0)={0x0, {{0x2, 0x0, @dev}}}, 0x88) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000002c0)) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=@known='security.evm\x00', &(0x7f0000000380)='\x00', 0x1, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe19fa380f38211af353f081768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000840)={'security\x00', 0xd8}, &(0x7f00000008c0)=0x24) 03:33:54 executing program 5: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000140)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) getpgrp(0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003200)={{{@in=@multicast1}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000003300)=0xe8) getegid() ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003340)) fstat(0xffffffffffffffff, &(0x7f0000003380)) 03:33:54 executing program 4: keyctl$invalidate(0x15, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x7f, &(0x7f0000000140)=""/127}, 0x48) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000003c0)) stat(&(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xfffffffffffffda6) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000200)='syz1\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc364134aa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f99197a077966c463fd7998b400ba000079aaff43d0c4a145f8170f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:54 executing program 3: keyctl$set_reqkey_keyring(0x10, 0x7) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f0000000100)='/*/GPL+system+\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000a240)={{{@in=@loopback, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f000000a340)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a380)={@local, @multicast1}, &(0x7f000000a3c0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000fc40), 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000fe40)={@mcast2}, &(0x7f000000fe80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010140)={{{@in6=@dev, @in6=@ipv4}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000010240)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000010280)={@mcast2}, &(0x7f00000102c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010300)={{{@in6=@mcast1, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000010400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000011c80)={@local}, &(0x7f0000011cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000011d00)={'bridge0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013480)={'ip6_vti0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000013640)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000013740)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000013780)={'vcan0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013800)={0x0, @multicast1}, &(0x7f0000013840)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000013880)={@local, @multicast2}, &(0x7f00000138c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000013900)={{{@in6=@ipv4={[], [], @multicast2}, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000013a00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000013b40)={'nr0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000015180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000151c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000015200)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000015300)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000015400)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000015500)=0xe8) 03:33:55 executing program 2: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x20000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpgid(0x0) fstat(0xffffffffffffff9c, &(0x7f0000000480)) getgid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000500)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) getegid() openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/user\x00', 0x2, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000007c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='cpu.stat\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000840)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000940)='/dev/full\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)={&(0x7f0000000a40)='./file0\x00'}, 0x10) accept(0xffffffffffffff9c, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) socket$nl_generic(0x10, 0x3, 0x10) timerfd_create(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f40)) stat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getgid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001200)=0xe8) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001300)) inotify_init() signalfd4(0xffffffffffffff9c, &(0x7f0000001340), 0x8, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000001380)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000013c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@dev}}}, &(0x7f0000001500)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001540)) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgid() epoll_create1(0x0) pipe2(&(0x7f0000001640), 0x0) 03:33:55 executing program 1: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) add_key(&(0x7f00000000c0)="636966732e73ea6e65676f00", &(0x7f0000000300), &(0x7f0000000340), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) setitimer(0x0, &(0x7f0000000500)={{0x77359400}, {0x77359400}}, &(0x7f0000000140)) recvmmsg(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000047c0)={0x77359400}) pipe(&(0x7f0000000180)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x17, 0x0, {0x7, './file0'}}, 0x10) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000004800)=""/19, 0x13) fchmod(0xffffffffffffffff, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f0000000200)={0x8}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='%/\x00'}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000400), 0x0) seccomp(0x0, 0x0, &(0x7f0000004900)={0x0, &(0x7f0000004880)}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @remote, @rand_addr}, &(0x7f00000004c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @empty, @rand_addr}, &(0x7f0000000700)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000780), &(0x7f00000007c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a00)={@dev, @multicast1}, &(0x7f0000000a40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@rand_addr, @remote}, &(0x7f0000000ac0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in, @in=@multicast1}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000c40)=0xfffffffa) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000007ec0), 0x0, 0x0, &(0x7f0000008100)={0x77359400}) accept(0xffffffffffffffff, &(0x7f0000008140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000081c0)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000084c0)={{{@in6=@dev, @in=@remote}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000085c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008600)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000008700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000008740)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000008840)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000008880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000088c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008900)={{{@in=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000008a00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000008a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000008a80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008ac0)={@rand_addr, @rand_addr}, &(0x7f0000008b00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008b80)={0x0, @dev, @local}, &(0x7f0000008bc0)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000008c00)={@rand_addr, @remote}, &(0x7f0000008c40)=0xc) seccomp(0x1, 0x0, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:33:55 executing program 5: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000140)) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) getpgrp(0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003200)={{{@in=@multicast1}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000003300)=0xe8) getegid() ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003340)) fstat(0xffffffffffffffff, &(0x7f0000003380)) 03:33:55 executing program 4: keyctl$invalidate(0x15, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x7f, &(0x7f0000000140)=""/127}, 0x48) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000003c0)) stat(&(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xfffffffffffffda6) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000200)='syz1\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc364134aa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f99197a077966c463fd7998b400ba000079aaff43d0c4a145f8170f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:55 executing program 0: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000440)=0xe8) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'syzkaller1\x00', @ifru_hwaddr=@remote}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) getegid() open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002ec0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000002e80)='team\x00'}, 0x30) getresgid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002fc0)) getgroups(0x0, &(0x7f0000003000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000003040)='syzkaller1\x00', 0xffffffffffffffff}, 0x30) getegid() socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000030c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) lstat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003340), 0x0, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000005c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@loopback, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000940)=0xe8) getpid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in=@multicast2, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000ac0)={@loopback}, &(0x7f0000000b00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @broadcast, @multicast2}, &(0x7f0000000380)=0x3e4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c00)={"62637368faad11fc43d6b41a00"}) 03:33:56 executing program 4: keyctl$invalidate(0x15, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x7f, &(0x7f0000000140)=""/127}, 0x48) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000003c0)) stat(&(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xfffffffffffffda6) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000200)='syz1\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc364134aa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f99197a077966c463fd7998b400ba000079aaff43d0c4a145f8170f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:33:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000180)}) keyctl$join(0x1, &(0x7f0000000140)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={"6c7c0000000000000000df00", {0x2, 0x0, @multicast1}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000), 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000003c0)) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@hci, &(0x7f0000000240)=0x80) fcntl$getown(0xffffffffffffffff, 0x9) getgid() getegid() ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) getgroups(0x0, &(0x7f0000000300)) preadv(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 03:33:56 executing program 5: getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000880)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in6=@ipv4, @in6=@local}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000007580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000075c0)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000076c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007780)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000007880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007900)={{{@in6=@loopback, @in=@dev}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000007a00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007a80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007ac0), &(0x7f0000007b00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:33:57 executing program 4: setrlimit(0x0, &(0x7f00000000c0)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f00000001c0)=""/148) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000280), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) capget(&(0x7f00000000c0), &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x7, 0x0) clock_settime(0x0, &(0x7f0000000380)={0x0, 0x989680}) socket$unix(0x1, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) add_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000440), &(0x7f00000005c0), 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000006c0)="63657068004e71a923d714803dc5dc8b6cdf547bb01afb79e4ae61c5e2f2c432bc09cb091160205c4cef85be13bf008f4f45fdbf36ce1ea59559e9dd04e5571e89143973822ba4633c049d99037f26f0a48ed0a407f372b20740a76131957b7b268843a787df103fd1ae214dfe6241105d4663a57b8d", &(0x7f0000000740), &(0x7f0000000500), 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000004c0), 0xa) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) iopl(0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140), 0xc) socket(0x0, 0x0, 0x0) getpgrp(0xffffffffffffffff) getuid() setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000500)) getpgrp(0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@loopback, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000180)={'yam0\x00', {0x2, 0x0, @rand_addr}}) 03:33:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000180)}) keyctl$join(0x1, &(0x7f0000000140)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={"6c7c0000000000000000df00", {0x2, 0x0, @multicast1}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000), 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000003c0)) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@hci, &(0x7f0000000240)=0x80) fcntl$getown(0xffffffffffffffff, 0x9) getgid() getegid() ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) getgroups(0x0, &(0x7f0000000300)) preadv(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 03:33:57 executing program 5: getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000880)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in6=@ipv4, @in6=@local}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000007580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000075c0)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000076c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007780)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000007880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007900)={{{@in6=@loopback, @in=@dev}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000007a00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007a80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007ac0), &(0x7f0000007b00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:33:58 executing program 3: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000540)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000580)={0x9}, 0x9) socket$netlink(0x10, 0x3, 0x0) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:59 executing program 2: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x20000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpgid(0x0) fstat(0xffffffffffffff9c, &(0x7f0000000480)) getgid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000500)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) getegid() openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/user\x00', 0x2, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000007c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='cpu.stat\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000840)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000940)='/dev/full\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)={&(0x7f0000000a40)='./file0\x00'}, 0x10) accept(0xffffffffffffff9c, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) socket$nl_generic(0x10, 0x3, 0x10) timerfd_create(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f40)) stat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getgid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001200)=0xe8) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001300)) inotify_init() signalfd4(0xffffffffffffff9c, &(0x7f0000001340), 0x8, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000001380)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000013c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@dev}}}, &(0x7f0000001500)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001540)) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgid() epoll_create1(0x0) pipe2(&(0x7f0000001640), 0x0) 03:33:59 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000140)) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000180)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 03:33:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000180)}) keyctl$join(0x1, &(0x7f0000000140)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={"6c7c0000000000000000df00", {0x2, 0x0, @multicast1}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000), 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000003c0)) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@hci, &(0x7f0000000240)=0x80) fcntl$getown(0xffffffffffffffff, 0x9) getgid() getegid() ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) getgroups(0x0, &(0x7f0000000300)) preadv(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 03:33:59 executing program 5: getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000880)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in6=@ipv4, @in6=@local}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000007580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000075c0)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000076c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007780)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000007880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007900)={{{@in6=@loopback, @in=@dev}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000007a00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007a80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007ac0), &(0x7f0000007b00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:33:59 executing program 3: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000540)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000580)={0x9}, 0x9) socket$netlink(0x10, 0x3, 0x0) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:33:59 executing program 1: madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xa) clock_gettime(0x0, &(0x7f0000001680)) clock_gettime(0x0, &(0x7f0000000480)) clock_nanosleep(0x0, 0x0, &(0x7f0000000200), &(0x7f00000002c0)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000380)=0x30) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000003c0)=""/35, &(0x7f0000000400)=0x23) request_key(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f00000001c0)='\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:00 executing program 5: getpriority(0x0, 0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000080)) creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000280)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f00000004c0)=@can, 0x80, &(0x7f0000000800), 0x0, &(0x7f0000000880)=""/4096, 0x1000}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001980)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in6=@ipv4, @in6=@local}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000007580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000075c0)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f00000076c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007740)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007780)={{{@in6=@mcast1, @in6=@local}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000007880)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007900)={{{@in6=@loopback, @in=@dev}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000007a00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007a80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007ac0), &(0x7f0000007b00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007b80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000180)}) keyctl$join(0x1, &(0x7f0000000140)) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000040)={"6c7c0000000000000000df00", {0x2, 0x0, @multicast1}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) socket$inet6(0xa, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000), 0x20) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000003c0)) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@hci, &(0x7f0000000240)=0x80) fcntl$getown(0xffffffffffffffff, 0x9) getgid() getegid() ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) getgroups(0x0, &(0x7f0000000300)) preadv(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 03:34:00 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xffffffff) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000340)) pipe(&(0x7f00000005c0)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000280), 0x4) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in=@multicast1, @in6=@mcast1}}, {{}, 0x0, @in=@local}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000680)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) getgid() getegid() getresgid(&(0x7f0000000c40), &(0x7f0000000c80), &(0x7f0000000cc0)) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getgroups(0x0, &(0x7f0000000e40)) lsetxattr$system_posix_acl(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000e80)=ANY=[], 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000600)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000500)=0x80, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) mknod$loop(&(0x7f0000000480)='./file0\x00', 0x0, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") getdents64(0xffffffffffffffff, &(0x7f00000003c0)=""/85, 0x55) pwrite64(0xffffffffffffffff, &(0x7f0000001600), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xffffff46, &(0x7f00000001c0)}, 0x3f) memfd_create(&(0x7f0000000200)='/dev/full\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000180)={0x14}, 0x14) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000740), 0xffffff1b) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="4280485520595969ef69dc00d99066410f60bad33f00007c2aaf200f38211a40a564a741dde044e000ede57d0fecec1a1a01460fbb5f4343a3b786e6989f") 03:34:00 executing program 4: rt_sigpending(&(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') keyctl$set_reqkey_keyring(0x4, 0x0) request_key(&(0x7f0000001580)='big_key\x00', &(0x7f0000000140), &(0x7f0000001500)='\x00', 0xffffffffffffffff) keyctl$setperm(0x5, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001540)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@multicast1, @in6}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000200)=0xffffff8c) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000240)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e5411a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000300)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @loopback}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) 03:34:01 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000004c0)) timer_create(0x0, &(0x7f0000000800), &(0x7f0000000500)) timer_delete(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) geteuid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() getgroups(0x1923564a7a58af82, &(0x7f0000000940)) getpeername(0xffffffffffffffff, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/load\x00', 0x2, 0x0) pipe2(&(0x7f0000000240), 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) fchmod(0xffffffffffffffff, 0x0) getpid() timer_create(0x0, &(0x7f0000000840), &(0x7f0000000880)) timer_gettime(0x0, &(0x7f0000000140)) 03:34:01 executing program 0: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000a00)={0x0, &(0x7f0000000840)}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000780)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f00000009c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in6=@mcast2}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getgroups(0x2, &(0x7f0000000180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000600)) getgroups(0x21b, &(0x7f0000000400)) stat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f00000017c0)) request_key(&(0x7f00000006c0)='id_legacy\x00', &(0x7f0000000880), &(0x7f00000008c0)='em1cpusetuser\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000900)='rxrpc\x00', &(0x7f0000000940), &(0x7f0000000980)='\x00', 0xfffffffffffffffa) add_key(&(0x7f0000000640)='logon\x00', &(0x7f0000000680), &(0x7f0000000b00), 0x0, 0x0) request_key(&(0x7f0000000140)="6302004b70a88f", &(0x7f0000000700), &(0x7f0000000740)='cpuacct.usage_perctu_user\x00', 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000180), &(0x7f0000000800)='cpuacct.usage_percpu_user\x00', 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000001680)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000300)={@remote}, &(0x7f00000003c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000012c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000013c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006bc0)={{{@in6=@local, @in6}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000006cc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006d00)={"000000fbff000000000100"}) getsockname$packet(0xffffffffffffffff, &(0x7f0000006d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006d80)=0xfea3) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006dc0)={0x0, @rand_addr, @dev}, &(0x7f0000000480)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000006f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006f40)=0x14) 03:34:02 executing program 2: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x20000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpgid(0x0) fstat(0xffffffffffffff9c, &(0x7f0000000480)) getgid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000500)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000540)=0xe8) getegid() openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/user\x00', 0x2, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000007c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000800)='cpu.stat\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000840)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000880)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000940)='/dev/full\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a00)='./file0\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000a80)={&(0x7f0000000a40)='./file0\x00'}, 0x10) accept(0xffffffffffffff9c, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) socket$nl_generic(0x10, 0x3, 0x10) timerfd_create(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f40)) stat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) getgid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000010c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001100)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000001200)=0xe8) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000001300)) inotify_init() signalfd4(0xffffffffffffff9c, &(0x7f0000001340), 0x8, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000001380)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000013c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001400)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@dev}}}, &(0x7f0000001500)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001540)) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgid() epoll_create1(0x0) pipe2(&(0x7f0000001640), 0x0) 03:34:02 executing program 4: syslog(0x0, &(0x7f0000000080)=""/83, 0x53) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, 0x6e) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000300)='net\x00') prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003000), &(0x7f0000003040)=0x14) sendto(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000003080)=@hci, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") accept4$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x0) 03:34:02 executing program 5: setpriority(0x0, 0x0, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000500), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000580), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[]}}, 0x0) io_setup(0x0, &(0x7f0000000040)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)=@getqdisc={0x24}, 0x24}}, 0x0) unshare(0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:02 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) mlockall(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="420f0f6f01946969ef69dc00d9f000f200008020d292000000001137370f38211ac46144e2974e2179fb12e5c4a1c9e8dc0f2e1a430f00ce068f0978e3c09f4b") 03:34:02 executing program 0: rt_sigtimedwait(&(0x7f0000000740), 0x0, &(0x7f0000000780)={0x0, 0x1c9c380}, 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000340)=""/57) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000380)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000500)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000001ac0)) syz_emit_ethernet(0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da06d0fef69dc0f01eeaf6c66410f6840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) 03:34:02 executing program 3: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000540)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000580)={0x9}, 0x9) socket$netlink(0x10, 0x3, 0x0) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:03 executing program 4: syslog(0x0, &(0x7f0000000080)=""/83, 0x53) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, 0x6e) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000300)='net\x00') prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003000), &(0x7f0000003040)=0x14) sendto(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000003080)=@hci, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") accept4$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x0) 03:34:03 executing program 0: rt_sigtimedwait(&(0x7f0000000740), 0x0, &(0x7f0000000780)={0x0, 0x1c9c380}, 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000340)=""/57) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000380)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000500)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000001ac0)) syz_emit_ethernet(0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da06d0fef69dc0f01eeaf6c66410f6840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) 03:34:03 executing program 5: futex(&(0x7f0000000280), 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) inotify_init() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/checkreqprot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000680)) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[], 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000580)=0x1c) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) getresuid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, 0x0, 0x0) getrandom(&(0x7f0000000280)=""/104, 0x3e4, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) memfd_create(&(0x7f0000000380)='md5sum\'}selfem1\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") add_key(&(0x7f0000000340)='cifs.idmap\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000980), 0x0, 0xfffffffffffffffc) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:34:03 executing program 1: seccomp(0x1, 0xfffffffffffffffc, &(0x7f0000000240)={0x20000000000000e3, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@remote, @in6}}, {{@in=@remote}}}, &(0x7f00000005c0)=0xe8) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000080)=0xfffffffffffffd10, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000640)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000880)) getegid() getresgid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) getegid() getgroups(0x0, &(0x7f0000000a40)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) add_key(&(0x7f0000000280)='trusted\x00', &(0x7f00000003c0), 0x0, 0x0, 0xfffffffffffffffb) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000600), 0xc) add_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000300)='\x00', 0xffffffffffffffff, &(0x7f0000000340)='./file0\x00') mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) pipe2(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0c60fef69dc0f01eec4a191690873fe19fa380f38211af36cf0c10f3c8cc8c886020d00020d00e5bc2b0000002167f00fbab204000000ca6b21796667660fe5737ce5417545c4010d64ac1e5d31a3b744dbe271fb0f6708") 03:34:03 executing program 3: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[]}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000540)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000580)={0x9}, 0x9) socket$netlink(0x10, 0x3, 0x0) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:04 executing program 5: getpriority(0x1, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/mls\x00', 0x0, 0x0) gettid() stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000020c0)={{{@in=@broadcast, @in=@dev}}, {{}, 0x0, @in=@dev}}, &(0x7f00000021c0)=0xe8) getegid() getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002200)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f0000002300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000026c0)) geteuid() getgroups(0x0, &(0x7f0000002700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002880)=0xe8) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000029c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000002ac0)=0xe8) getresgid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005100)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f00000050c0)='/selinux/avc/hash_stats\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005140)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000005240)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005280)) getpid() getresuid(&(0x7f0000005300), &(0x7f0000005340), &(0x7f0000005380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005580)=0xe8) getgroups(0x0, &(0x7f00000055c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006780)) geteuid() getresgid(&(0x7f00000067c0), &(0x7f0000006800), &(0x7f0000006840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000068c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000006880)='rose0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in=@multicast1, @in=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006a00)=0xe8) getresgid(&(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006b00)={{{@in=@remote, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006cc0)) fstat(0xffffffffffffffff, &(0x7f0000006d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}}}, &(0x7f0000007580)=0xe8) getresgid(&(0x7f00000075c0), &(0x7f0000007600), &(0x7f0000007640)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000076c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) setpriority(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000080)=0xfffffffffffffdf6) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000340)) eventfd(0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00'}) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000200)={'syz_tun\x00'}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000003c0)=""/75) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:05 executing program 3: getrandom(&(0x7f0000000200)=""/148, 0x6, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000dc0)) getresuid(&(0x7f0000000d00), &(0x7f0000000e40), &(0x7f0000000e80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 03:34:05 executing program 4: syslog(0x0, &(0x7f0000000080)=""/83, 0x53) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, 0x6e) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000300)='net\x00') prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003000), &(0x7f0000003040)=0x14) sendto(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000003080)=@hci, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") accept4$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x0) 03:34:05 executing program 5: getpriority(0x1, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/mls\x00', 0x0, 0x0) gettid() stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000020c0)={{{@in=@broadcast, @in=@dev}}, {{}, 0x0, @in=@dev}}, &(0x7f00000021c0)=0xe8) getegid() getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002200)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f0000002300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000026c0)) geteuid() getgroups(0x0, &(0x7f0000002700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002880)=0xe8) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000029c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000002ac0)=0xe8) getresgid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005100)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f00000050c0)='/selinux/avc/hash_stats\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005140)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000005240)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005280)) getpid() getresuid(&(0x7f0000005300), &(0x7f0000005340), &(0x7f0000005380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005580)=0xe8) getgroups(0x0, &(0x7f00000055c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006780)) geteuid() getresgid(&(0x7f00000067c0), &(0x7f0000006800), &(0x7f0000006840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000068c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000006880)='rose0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in=@multicast1, @in=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006a00)=0xe8) getresgid(&(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006b00)={{{@in=@remote, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006cc0)) fstat(0xffffffffffffffff, &(0x7f0000006d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}}}, &(0x7f0000007580)=0xe8) getresgid(&(0x7f00000075c0), &(0x7f0000007600), &(0x7f0000007640)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000076c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) setpriority(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000080)=0xfffffffffffffdf6) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000340)) eventfd(0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00'}) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000200)={'syz_tun\x00'}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000003c0)=""/75) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:05 executing program 2: getuid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000380)=0xc) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/validatetrans\x00', 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ptrace$peekuser(0x3, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f0000000400)) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000340)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000200)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 03:34:05 executing program 0: rt_sigtimedwait(&(0x7f0000000740), 0x0, &(0x7f0000000780)={0x0, 0x1c9c380}, 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000340)=""/57) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000380)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000500)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000001ac0)) syz_emit_ethernet(0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da06d0fef69dc0f01eeaf6c66410f6840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) 03:34:05 executing program 5: getpriority(0x1, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/mls\x00', 0x0, 0x0) gettid() stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000020c0)={{{@in=@broadcast, @in=@dev}}, {{}, 0x0, @in=@dev}}, &(0x7f00000021c0)=0xe8) getegid() getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002200)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f0000002300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000026c0)) geteuid() getgroups(0x0, &(0x7f0000002700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002880)=0xe8) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000029c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000002ac0)=0xe8) getresgid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005100)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f00000050c0)='/selinux/avc/hash_stats\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005140)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000005240)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005280)) getpid() getresuid(&(0x7f0000005300), &(0x7f0000005340), &(0x7f0000005380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005580)=0xe8) getgroups(0x0, &(0x7f00000055c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006780)) geteuid() getresgid(&(0x7f00000067c0), &(0x7f0000006800), &(0x7f0000006840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000068c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000006880)='rose0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in=@multicast1, @in=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006a00)=0xe8) getresgid(&(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006b00)={{{@in=@remote, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006cc0)) fstat(0xffffffffffffffff, &(0x7f0000006d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}}}, &(0x7f0000007580)=0xe8) getresgid(&(0x7f00000075c0), &(0x7f0000007600), &(0x7f0000007640)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000076c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) setpriority(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000080)=0xfffffffffffffdf6) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000340)) eventfd(0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00'}) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000200)={'syz_tun\x00'}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000003c0)=""/75) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:05 executing program 5: getpriority(0x1, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/mls\x00', 0x0, 0x0) gettid() stat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002040), &(0x7f0000002080)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000020c0)={{{@in=@broadcast, @in=@dev}}, {{}, 0x0, @in=@dev}}, &(0x7f00000021c0)=0xe8) getegid() getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002200)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f0000002300)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002340), &(0x7f0000002380)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000026c0)) geteuid() getgroups(0x0, &(0x7f0000002700)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002880)=0xe8) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000029c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000002ac0)=0xe8) getresgid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005100)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f00000050c0)='/selinux/avc/hash_stats\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005140)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000005240)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005280)) getpid() getresuid(&(0x7f0000005300), &(0x7f0000005340), &(0x7f0000005380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005480)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6}, 0x0, @in6}}, &(0x7f0000005580)=0xe8) getgroups(0x0, &(0x7f00000055c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006780)) geteuid() getresgid(&(0x7f00000067c0), &(0x7f0000006800), &(0x7f0000006840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000068c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000006880)='rose0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in=@multicast1, @in=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000006a00)=0xe8) getresgid(&(0x7f0000006a40), &(0x7f0000006a80), &(0x7f0000006ac0)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006b00)={{{@in=@remote, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006cc0)) fstat(0xffffffffffffffff, &(0x7f0000006d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006d80), &(0x7f0000006dc0)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@loopback}}}, &(0x7f0000007580)=0xe8) getresgid(&(0x7f00000075c0), &(0x7f0000007600), &(0x7f0000007640)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000076c0), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) setpriority(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000080)=0xfffffffffffffdf6) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000340)) eventfd(0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00'}) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000200)={'syz_tun\x00'}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) gettid() ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000003c0)=""/75) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:05 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") getrandom(&(0x7f0000000200)=""/148, 0xfffffffffffffef4, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000040)={{}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000540)) rmdir(&(0x7f0000000300)='./file0\x00') epoll_create(0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000340)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'gre0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast2, @in=@multicast1}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000780)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'syzkaller1\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000840)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000980)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000004480), 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f00000046c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004740)=0x80, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000004780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000047c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0xb) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004880)={{{@in=@dev, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000004980)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000004cc0)={&(0x7f0000000580), 0xffffff81, &(0x7f0000000ac0)={&(0x7f0000000b00)=ANY=[]}}, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x28, &(0x7f0000000380)}, 0x10) ustat(0x0, &(0x7f0000000140)) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 03:34:06 executing program 4: syslog(0x0, &(0x7f0000000080)=""/83, 0x53) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, 0x6e) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) syz_open_procfs(0x0, &(0x7f0000000300)='net\x00') prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003000), &(0x7f0000003040)=0x14) sendto(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000003080)=@hci, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") accept4$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x0) 03:34:07 executing program 1: prctl$void(0x21) pipe2(&(0x7f0000000280), 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000000c0)=ANY=[]) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffff) getpeername$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0xffffffffffffff56) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000140)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000000c0)}}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @dev}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003700), 0x0, 0x0, &(0x7f0000001500)={0x0, 0x989680}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:34:07 executing program 0: rt_sigtimedwait(&(0x7f0000000740), 0x0, &(0x7f0000000780)={0x0, 0x1c9c380}, 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000340)=""/57) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000380)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000500)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000001ac0)) syz_emit_ethernet(0x0, &(0x7f0000000300)=ANY=[], &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="42805da06d0fef69dc0f01eeaf6c66410f6840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") eventfd(0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) 03:34:07 executing program 4: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000300)={0x0, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) mknod$loop(&(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffffff) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000180)={'bond0\x00', {0x2, 0x0, @local}}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000480)=""/245) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0x4) 03:34:07 executing program 3: keyctl$session_to_parent(0x12) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000001c0), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @broadcast, @remote}, &(0x7f0000000240)=0xc) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000800)={0x0, @aes256}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000340)={'nat\x00'}, &(0x7f0000000500)=0x54) memfd_create(&(0x7f00000007c0)='@!^vmnet1\x00', 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000280)=@known='security.SMACK64IPOUT\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@remote, @rand_addr}, &(0x7f0000000580)=0xc) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) keyctl$set_reqkey_keyring(0xf, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xa49af3277e547f02, &(0x7f0000000500)={&(0x7f00000004c0)={0x3b4}, 0x14}}, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000640)={0x0, &(0x7f0000000600)}) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x1000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a0376969efea69dc364141aa3223c42255b72fc4c2958e09d26d44c19086d962788f35c935c97d197a0779fb63fd7b98ddb400ba000079aaa443d081818de146e146410fae1d008000001e5d05f3420f1b0f62397f") 03:34:07 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x6c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:07 executing program 4: getegid() setgroups(0x0, &(0x7f0000000180)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) getuid() getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000010c0)=0xe8) stat(&(0x7f0000001100)='./file1\x00', &(0x7f0000001140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000011c0)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) stat(&(0x7f00000012c0)='./file1\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getresuid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000019c0)={{{@in6, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000001c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001d00)) getresuid(&(0x7f0000001d40), &(0x7f0000001d80), &(0x7f0000001dc0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001e00)) stat(&(0x7f0000000100)='./file1\x00', &(0x7f00000003c0)) getgroups(0x0, &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004500), &(0x7f0000004540)=0xc) getresuid(&(0x7f0000004580), &(0x7f00000045c0), &(0x7f0000004600)) lstat(&(0x7f0000004640)='./file1\x00', &(0x7f0000004700)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000049c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a00), &(0x7f0000004a40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004b00), &(0x7f0000004b40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b80)={{{@in6, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000004c80)=0xe8) getresgid(&(0x7f0000004cc0), &(0x7f0000004d00), &(0x7f0000004d40)) getpid() lstat(&(0x7f0000005300)='./file1\x00', &(0x7f0000005340)) fstat(0xffffffffffffffff, &(0x7f00000053c0)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005440)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@local}}, &(0x7f0000005540)=0xe8) stat(&(0x7f0000005580)='./file1\x00', &(0x7f00000055c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006980)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000006940)='nat\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000069c0)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}}}, &(0x7f0000006ac0)=0xe8) lstat(&(0x7f0000006b00)='./file1\x00', &(0x7f0000006b40)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:34:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000100)=0xa7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socket(0x0, 0xa, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_buf(r2, 0x0, 0x11, &(0x7f0000000180)="83776de434208a0ec73e45cf1dc00f6095bf37314622b28f89ecee186d990067e3505c2cd7f01b84271b28c70e6da9ee19972cc533311967621b9628b356eba68e507674e725b4835dcff99b85da49dafd3fc6da9fbc57a545672cd37ea54f0f002e6b", 0x63) shutdown(r0, 0x1) ioctl$void(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x6, 0xfffffffffffffffa}, 0xa) 03:34:08 executing program 0: quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000003c0)) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file0/file0\x00', 0x1, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') socket$packet(0x11, 0x0, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast1, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffa) listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x0, 0x0, &(0x7f0000000100)) timerfd_create(0x0, 0x0) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000012c0)="42805da0c60fef69dc0f01eece73fe19fae89e1166450f6b361af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe2a5e400fb7e0703") accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0xf) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240), 0x0) mount(&(0x7f0000000600)=@nullb='/dev/nullb0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000440)='reiserfs\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0xffffffffffffff30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") clock_gettime(0x0, &(0x7f00000000c0)) clock_nanosleep(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 03:34:08 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x6c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:08 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[]}}, 0xfffffffffffffffd) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) getpgid(0x0) getpid() ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f0000000840)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") [ 3259.991622] audit: type=1326 audit(2000000048.291:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=22397 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000300)={@loopback, @local}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'teql0\x00'}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@ipv4={[], [], @remote}}) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x104) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) 03:34:09 executing program 0: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) accept4(0xffffffffffffffff, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000540)=0x80, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) eventfd2(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fac461796e04df3821436cf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b21790e25e5e44135450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:34:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000300)={@loopback, @local}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'teql0\x00'}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@ipv4={[], [], @remote}}) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x104) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) 03:34:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000300)={@loopback, @local}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'teql0\x00'}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@ipv4={[], [], @remote}}) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x104) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) 03:34:10 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) getpid() openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000180)}) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000280)) mincore(&(0x7f0000016000/0x1000)=nil, 0x1000, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000003c0)) clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in=@remote, @in6}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000f80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, 0xe8) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001500)) geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001840)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xfffffdf8) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001980)) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) 03:34:11 executing program 3: futex(&(0x7f0000000580), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000005c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000800)}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000280)) getpgrp(0xffffffffffffffff) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000380)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000001340)=ANY=[]) socketpair(0x0, 0x0, 0x0, &(0x7f00000002c0)) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000780)) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000540), 0xfffffffffffffe2e) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000700)=ANY=[], 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) futex(&(0x7f0000000480), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000500), 0x0) dup(0xffffffffffffffff) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) clock_gettime(0x0, &(0x7f0000000400)) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f00000007c0)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640)="6574683073656c667d5e87766d6e65743163707573657425776c616e3063707573657400", 0x0) add_key(&(0x7f0000000680)='logon\x00', &(0x7f00000006c0), &(0x7f0000000700), 0x4c5, 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee80eb0a38f6eeba39290f38c4827d20c9660f73f700fee60f2e2121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, "4cd353806e17ddfcca82fb6d4b5f7d5a7a4c19aec5efa13784abc230fdca7789"}) mlockall(0x0) pipe2(&(0x7f0000000040), 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000400), 0x0, 0x0) 03:34:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000140)=0x1c, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000300)={@loopback, @local}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'teql0\x00'}) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d9f2266466d9a10000002041ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") clock_gettime(0x0, &(0x7f0000004300)) recvmmsg(0xffffffffffffff9c, &(0x7f0000004200), 0x0, 0x0, &(0x7f0000004340)) request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000240), &(0x7f00000000c0)="7465716c30000000763c24682727162d", 0xfffffffffffffff8) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@ipv4={[], [], @remote}}) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x104) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000980)={{{@in=@multicast1, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)={@remote}, &(0x7f0000002040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'yam0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002280)={@local, @remote}, &(0x7f00000022c0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000023c0)={{{@in=@multicast1, @in=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f00000024c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002580)={0x0, @multicast2, @multicast1}, &(0x7f00000025c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000026c0)={{{@in, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@dev}, &(0x7f0000002840)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002980)={@mcast1}, &(0x7f00000029c0)=0x14) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000002a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002a80)={{{@in6=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000002b80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c80)=0x14) 03:34:11 executing program 0: inotify_init() ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000006440), 0x0, 0x0, &(0x7f0000006640)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006680)={{{@in6=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006780)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006900)={{{@in6, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000006a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006b00)={@remote, @broadcast}, &(0x7f0000006b40)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000006f80)={&(0x7f00000000c0), 0xc, &(0x7f0000006f40)={&(0x7f0000006b80)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/25) syz_execute_func(&(0x7f0000000280)="42805da0cd0fef69dc0f01eece73fe19fa380f1af3f081a4768cca0000808081b5e5bcf00fc78a000000000000a9a967f00fbab204000000cac422fd379cbf32233333dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:34:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000100)=0xa7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socket(0x0, 0xa, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_buf(r2, 0x0, 0x11, &(0x7f0000000180)="83776de434208a0ec73e45cf1dc00f6095bf37314622b28f89ecee186d990067e3505c2cd7f01b84271b28c70e6da9ee19972cc533311967621b9628b356eba68e507674e725b4835dcff99b85da49dafd3fc6da9fbc57a545672cd37ea54f0f002e6b", 0x63) shutdown(r0, 0x1) ioctl$void(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x6, 0xfffffffffffffffa}, 0xa) 03:34:12 executing program 4: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') syz_open_procfs(0x0, &(0x7f0000000380)='net/ptype\x00') ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)) getpid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000500)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0x43) getrusage(0x0, &(0x7f0000000240)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000600)=@nl=@proc, &(0x7f0000000700)=0x80, 0x0) pipe(&(0x7f0000000040)) getcwd(&(0x7f0000000e40)=""/188, 0xbc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000680)=""/122, 0xfffffffffffffd73, 0x0, &(0x7f0000000540)={0x2, 0x0, @remote}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000e00)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001000)='/dev/rtc0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000001080)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000fc0)=0x2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000480)={'bpq0\x00', {0x2, 0x0, @rand_addr}}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, &(0x7f00000002c0)=""/202) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000010c0)=ANY=[], 0x0) gettid() lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) 03:34:15 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x6c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:15 executing program 0: inotify_init() ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000006440), 0x0, 0x0, &(0x7f0000006640)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006680)={{{@in6=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006780)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006900)={{{@in6, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000006a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006b00)={@remote, @broadcast}, &(0x7f0000006b40)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000006f80)={&(0x7f00000000c0), 0xc, &(0x7f0000006f40)={&(0x7f0000006b80)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/25) syz_execute_func(&(0x7f0000000280)="42805da0cd0fef69dc0f01eece73fe19fa380f1af3f081a4768cca0000808081b5e5bcf00fc78a000000000000a9a967f00fbab204000000cac422fd379cbf32233333dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:34:15 executing program 1: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:15 executing program 4: gettid() getpgrp(0xffffffffffffffff) getpgid(0x0) getpid() fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc364164afc4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000001400), 0x0, 0x0, &(0x7f0000001440)={0x0, 0x1c9c380}) recvmmsg(0xffffffffffffffff, &(0x7f0000006540), 0x0, 0x0, &(0x7f0000000080)={0x77359400}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006740)={{{@in=@local, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000006840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006980)={@mcast1}, &(0x7f00000069c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000006a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006a40)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000006a80), &(0x7f0000006ac0)=0x14) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006d00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000006e00)=0xe8) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006e40)={0x0, @dev, @multicast2}, &(0x7f0000006e80)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006ec0)={@multicast2}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@ipv4={[], [], @dev}, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000007040)=0xe8) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@loopback}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xfffffffffffffef5) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000071c0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@ipv4}}, &(0x7f00000072c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000073c0)=0x14, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000640), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000680)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) 03:34:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000100)=0xa7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socket(0x0, 0xa, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_buf(r2, 0x0, 0x11, &(0x7f0000000180)="83776de434208a0ec73e45cf1dc00f6095bf37314622b28f89ecee186d990067e3505c2cd7f01b84271b28c70e6da9ee19972cc533311967621b9628b356eba68e507674e725b4835dcff99b85da49dafd3fc6da9fbc57a545672cd37ea54f0f002e6b", 0x63) shutdown(r0, 0x1) ioctl$void(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x6, 0xfffffffffffffffa}, 0xa) 03:34:15 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={&(0x7f0000000140), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=@polexpire={0xc0, 0x1b, 0x729, 0x0, 0x0, {{{@in6=@mcast1, @in=@loopback}, {}, {}, 0x0, 0x0, 0x3}}}, 0xc0}}, 0x0) 03:34:16 executing program 0: inotify_init() ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000006440), 0x0, 0x0, &(0x7f0000006640)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006680)={{{@in6=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006780)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006900)={{{@in6, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000006a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006b00)={@remote, @broadcast}, &(0x7f0000006b40)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000006f80)={&(0x7f00000000c0), 0xc, &(0x7f0000006f40)={&(0x7f0000006b80)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/25) syz_execute_func(&(0x7f0000000280)="42805da0cd0fef69dc0f01eece73fe19fa380f1af3f081a4768cca0000808081b5e5bcf00fc78a000000000000a9a967f00fbab204000000cac422fd379cbf32233333dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:34:16 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000080)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000380), 0xfffffffffffffeeb) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000002c0)) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0), 0x4) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000480)=ANY=[], 0x0) pipe2$9p(&(0x7f00000005c0), 0x0) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x18) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)}, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) getegid() gettid() getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) lstat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getgroups(0x0, &(0x7f0000000cc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000d00)) getresuid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getresgid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000f00)=')wlan0eth0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000001080)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000010c0)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001140)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000001240)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001280)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001300)) stat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) getgroups(0x0, &(0x7f0000001400)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002540)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000001440)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003e80)={{{@in=@broadcast, @in6}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000003f80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003fc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004200)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f00000041c0)=']+\\y\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004240)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000004340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004380), &(0x7f00000043c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004440)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004400)='\x00', 0xffffffffffffffff}, 0x30) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:34:16 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x6c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:34:16 executing program 3: clock_nanosleep(0x7, 0x1, &(0x7f0000000340), &(0x7f0000000280)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, &(0x7f00000000c0), 0x8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000080)) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) flistxattr(0xffffffffffffffff, &(0x7f0000000380)=""/235, 0xeb) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f00000007c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@multicast1, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in, @in6}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000ac0)=0xe8) getegid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000b00), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:34:17 executing program 0: inotify_init() ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000240)) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffff9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in=@remote, @in=@loopback}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000006440), 0x0, 0x0, &(0x7f0000006640)={0x77359400}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006680)={{{@in6=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006780)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000006900)={{{@in6, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000006a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006b00)={@remote, @broadcast}, &(0x7f0000006b40)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000006f80)={&(0x7f00000000c0), 0xc, &(0x7f0000006f40)={&(0x7f0000006b80)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/25) syz_execute_func(&(0x7f0000000280)="42805da0cd0fef69dc0f01eece73fe19fa380f1af3f081a4768cca0000808081b5e5bcf00fc78a000000000000a9a967f00fbab204000000cac422fd379cbf32233333dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:34:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000100)=0xa7) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socket(0x0, 0xa, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_buf(r2, 0x0, 0x11, &(0x7f0000000180)="83776de434208a0ec73e45cf1dc00f6095bf37314622b28f89ecee186d990067e3505c2cd7f01b84271b28c70e6da9ee19972cc533311967621b9628b356eba68e507674e725b4835dcff99b85da49dafd3fc6da9fbc57a545672cd37ea54f0f002e6b", 0x63) shutdown(r0, 0x1) ioctl$void(0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x6, 0xfffffffffffffffa}, 0xa) 03:34:17 executing program 5: memfd_create(&(0x7f0000000080)=']{\x00', 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000500)=ANY=[], 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000003c0)) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000740)=""/165) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000500)=ANY=[]) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000980)) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000bc0)=0xe8) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) geteuid() lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getresuid(&(0x7f0000000d80), &(0x7f0000000dc0), &(0x7f0000000e00)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) getegid() geteuid() dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) preadv(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") getgroups(0x0, &(0x7f0000001300)) getuid() getgid() 03:34:17 executing program 1: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:17 executing program 4: futex(&(0x7f0000000080), 0x6, 0x0, &(0x7f0000000100)={0x400000000}, &(0x7f00000000c0), 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='pids.current\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@local}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000000780)=0xe8) accept4(0xffffffffffffff9c, &(0x7f0000000a40)=@hci, &(0x7f00000009c0)=0x80, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000f00)=""/72, 0x48}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000fc0)={0x0, @rand_addr, @remote}, &(0x7f0000001000)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001140)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@dev, @in6=@remote}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000015c0)={{{@in6=@remote, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000016c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001700)={'veth0_to_bond\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001880)={{{@in=@rand_addr, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001980)=0xe8) accept(0xffffffffffffffff, &(0x7f00000019c0)=@hci, &(0x7f0000001a40)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001a80)={'veth1_to_team\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f00000006c0), 0xc, &(0x7f0000001e40)={&(0x7f0000001ac0)={0x14}, 0x14}}, 0x0) pipe2$9p(&(0x7f0000000100), 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='wchan\x00') ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000002c0)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000580)) setresgid(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000380)={@empty, @ipv4={[], [], @remote}, @loopback}) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:18 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x6, 0x3) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) getuid() getresuid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004000)) syz_execute_func(&(0x7f0000000280)="c4c13a10c82e66450f383133c4e17be6a109000000c48279250d000080200f5f6970c40161600b26f36d400fe8cac462d1be2bc4e10c5613") 03:34:18 executing program 0: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f00000005c0)="df", 0x1, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, 0x0, 0x0) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000340), 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), &(0x7f0000000600)=0x14) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000640)) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000780)) clock_settime(0x0, &(0x7f0000000740)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@loopback}, &(0x7f0000000240)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={0x0, 0x1, 0x6, @remote}, 0x10) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x3cd}) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000200), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000540)) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") 03:34:18 executing program 4: recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/44, 0x2c, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:34:18 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0xfffffffffffffffc, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) pipe2(&(0x7f0000000080), 0x0) unshare(0x0) pipe2(&(0x7f0000000140), 0x0) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) geteuid() getresuid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) getuid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000016c0)) getgroups(0x0, &(0x7f0000001700)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001740)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001840)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getpgrp(0xffffffffffffffff) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:34:19 executing program 0: timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000800)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001a40)={{{@in, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001b40)=0xe8) getresgid(&(0x7f0000001b80), &(0x7f0000001bc0), &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001c40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001c80)={{{@in6, @in=@rand_addr}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001d80)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001dc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001e00)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002300), &(0x7f0000002340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002380), &(0x7f00000023c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002400)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002480), &(0x7f00000024c0)=0xc) lstat(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0), &(0x7f0000002600)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002640)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000002740)=0xe8) getegid() getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002780)={{{@in=@local, @in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002880)=0xe8) getresgid(&(0x7f00000028c0), &(0x7f0000002900), &(0x7f0000002940)) getpid() geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002980), &(0x7f00000029c0)=0xc) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000002a00)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004040)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004080)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000004180)=0xe8) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000053c0)) stat(&(0x7f0000005400)='./file0\x00', &(0x7f0000005440)) stat(&(0x7f00000054c0)='./file0\x00', &(0x7f0000005500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005580)) geteuid() getresgid(&(0x7f00000055c0), &(0x7f0000005600), &(0x7f0000005640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005680)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000056c0), &(0x7f0000005700)=0xc) getpgrp(0x0) getresuid(&(0x7f0000005740), &(0x7f0000005780), &(0x7f00000057c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005800), &(0x7f0000005840)=0xc) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005880)={{{@in6=@loopback, @in6=@mcast1}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000005980)=0xe8) lstat(&(0x7f00000059c0)='./file0\x00', &(0x7f0000005a00)) getpid() geteuid() getgroups(0x0, &(0x7f0000005a80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007400), 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000000c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000840)=0xcf) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000680)={'nat\x00'}, &(0x7f0000000700)=0x78) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:34:19 executing program 4: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) rename(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='yeah\x00', 0x5) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000a80)) syz_genetlink_get_family_id$team(&(0x7f0000000d40)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @empty, @dev}, &(0x7f0000000840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000880)={0x0, @multicast1, @local}, &(0x7f00000008c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@mcast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000cc0)=0xffffffffffffff3f) 03:34:20 executing program 5: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000280), 0x0, 0x1, &(0x7f00000002c0)={0x77359400}, &(0x7f0000000300), 0x0) nanosleep(&(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000016c0)) fstat(0xffffffffffffffff, &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001780)) getpgrp(0x0) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001800)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) getresgid(&(0x7f0000001c80), &(0x7f0000001cc0), &(0x7f0000001d00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d80)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001d40)='/dev/null\x00'}, 0x30) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002680)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000002780)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f00000028c0)=0xe8) getresgid(&(0x7f0000002900), &(0x7f0000002940), &(0x7f0000002980)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000029c0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000002ac0)=0xe8) stat(&(0x7f0000002b00)='./file0\x00', &(0x7f0000002b40)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002bc0), &(0x7f0000002c00)=0xc) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002c40)) fstat(0xffffffffffffffff, &(0x7f0000002c80)) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002dc0)) stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) getegid() getpid() stat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) stat(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003540)) getresuid(&(0x7f0000003580), &(0x7f00000035c0), &(0x7f0000003600)) stat(&(0x7f0000003640)='./file0\x00', &(0x7f0000003680)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003700), &(0x7f0000003740)=0xc) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003780)) stat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003880)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000003980)=0xe8) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:34:20 executing program 0: socket$unix(0x1, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000b80)=0xffffffffffffffaf) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) getpid() lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000000140)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000400)) pipe(&(0x7f0000001dc0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() lstat(&(0x7f00000006c0)='\x00', &(0x7f0000000580)) getegid() getpgrp(0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) 03:34:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000002000)={0x0, 0x109, &(0x7f0000000380)=@raw, &(0x7f0000ac3000)="47505d04", 0x0, 0xfffffffffffffd4c, &(0x7f0000000080)=""/103}, 0x48) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x7fff, @mcast2}, 0x1c) fcntl$setstatus(r0, 0x4, 0x6100) fcntl$getown(r0, 0x9) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) removexattr(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)=@known='security.capability\x00') fallocate(r1, 0x0, 0x0, 0x1000f4) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f00000003c0), 0x8000fffffffe) 03:34:20 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) 03:34:20 executing program 1: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:20 executing program 2: socket$nl_route(0x10, 0x3, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], &(0x7f0000000180)=""/75, 0x4b) creat(&(0x7f0000000200)='./file0\x00', 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 03:34:20 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x210007f7, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{}]}, 0x10) 03:34:20 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) syz_open_procfs(0x0, &(0x7f0000000380)='net/mcfilter6\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/77) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000380), &(0x7f00000003c0)=0x30) syz_execute_func(&(0x7f0000000b40)="42805da0ad52ef84dcce67f3406e660c54261ef36ef36e768cc80000000f00c367f00fbab204000000ca41e82d3100005cca670f38020a0f3e450f2b38010d64ac1e5d66440f2eb6f19ea5e30721") syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380), 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x44) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000001380), 0x0, 0xfffffffffffffffb) keyctl$describe(0x6, 0x0, &(0x7f0000001440)=""/75, 0x4b) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000500), 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[]}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[]}}, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000005c0), 0x4) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14) 03:34:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x210007f7, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{}]}, 0x10) 03:34:21 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000080)={'bond_slave_1\x00'}) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/191) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={0xffffffffffffff9c, 0x28, &(0x7f0000000200)}, 0x10) syz_execute_func(&(0x7f0000000140)="428055a0dec48159dc9bfc00000000d990c841ff0f1837370f38211ac19086d9f28fc9410feefa4e2179fbe5e5417545180f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:21 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x210007f7, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{}]}, 0x10) 03:34:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) clone(0x210007f7, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{}]}, 0x10) 03:34:22 executing program 4: setpriority(0x1, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x2cc) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:34:22 executing program 5: futex(&(0x7f0000000000), 0x3, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000240), 0x0) getresuid(&(0x7f00000008c0), &(0x7f0000000300), &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000380)) pipe2(&(0x7f0000000900), 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000940)={0x7}, 0x7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@remote, @in=@multicast1}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) setresuid(0x0, 0x0, 0x0) getresuid(&(0x7f00000002c0), &(0x7f0000000340), &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000280)=0xc) write(0xffffffffffffffff, &(0x7f0000000540), 0x0) add_key(&(0x7f0000000640)='asymmetric\x00', &(0x7f0000000680), &(0x7f00000006c0), 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000007c0)='.dead\x00', &(0x7f0000000800)='/dev/keychord\x00') syz_execute_func(&(0x7f0000000080)="42805da0a10fef69f7dcdc01eec461fe7f92008000006c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b207841754555552e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:22 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) 03:34:22 executing program 1: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000140)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200), 0xc, &(0x7f0000000400)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f0000000500)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440)}}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000280), 0x10) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) setfsgid(0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)) rt_sigpending(&(0x7f00000001c0), 0x8) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='!\x00', 0xffffffffffffff9c}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000003b40)) rmdir(&(0x7f0000000080)='./file0\x00') syz_execute_func(&(0x7f0000003bc0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d4200ff2ec21a121a12f6585501ee31a3b786e2989fc4227992749f55") ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) creat(&(0x7f0000003b80)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000003a80)) recvmmsg(0xffffffffffffffff, &(0x7f0000003940), 0x0, 0x0, &(0x7f0000003ac0)) connect$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='westwood\x00', 0x9) dup(0xffffffffffffffff) 03:34:23 executing program 2: rt_sigpending(&(0x7f0000000040), 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept(0xffffffffffffffff, &(0x7f0000000240)=@sco, &(0x7f0000000180)=0xfffffd92) connect$unix(0xffffffffffffffff, &(0x7f00000002c0)=@abs, 0x6e) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$void(0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000480)={"4e45544d4150ac00"}, &(0x7f0000000440)=0xfffffffffffffd24) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) add_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000580), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) 03:34:23 executing program 4: gettid() ioprio_get$pid(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) setpriority(0x0, 0x0, 0x0) syz_emit_ethernet(0x0, &(0x7f00000002c0)=ANY=[], 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) close(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000840)) getpgrp(0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) socket$unix(0x1, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000007c0)=0x14) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000800)={0x0, 0x1, 0x6, @broadcast}, 0x10) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000480)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lgetxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@known='trusted.overlay.opaque\x00', &(0x7f0000000500)=""/155, 0x9b) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa0f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab276000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:34:23 executing program 5: keyctl$invalidate(0x15, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) 03:34:23 executing program 1: memfd_create(&(0x7f0000000040)=',keyringcpuset@[ppp1\x00', 0xfffffffffffffffe) socket$packet(0x11, 0x0, 0x300) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000480)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000000), 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000000c0)=@req3, 0x1c) poll(&(0x7f0000000540), 0x200005a1, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/133, 0x85) syz_open_pts(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000140)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") geteuid() geteuid() setreuid(0x0, 0x0) 03:34:23 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='mountinfo\x00') openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=0xffffffffffffffff, 0x4) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:34:23 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) fstat(0xffffffffffffff9c, &(0x7f0000000280)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getgid() stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) setfsgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)=""/243, 0xf3) timerfd_create(0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000640)) fcntl$getflags(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000003c0)) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 03:34:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) 03:34:24 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) 03:34:24 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) fstat(0xffffffffffffff9c, &(0x7f0000000280)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getgid() stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) setfsgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)=""/243, 0xf3) timerfd_create(0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000640)) fcntl$getflags(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000003c0)) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 03:34:24 executing program 5: keyctl$set_reqkey_keyring(0x2, 0xfffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)=@llc, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000000580)=ANY=[]}, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fgetxattr(0xffffffffffffffff, &(0x7f0000000300)=@known='trusted.overlay.upper\x00', &(0x7f0000000340)=""/252, 0xfc) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001740)='/selinux/status\x00', 0x0, 0x0) 03:34:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) 03:34:25 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) fstat(0xffffffffffffff9c, &(0x7f0000000280)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getgid() stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) setfsgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)=""/243, 0xf3) timerfd_create(0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000640)) fcntl$getflags(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000003c0)) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 03:34:26 executing program 2: epoll_create1(0x0) socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000000)={@mcast2}) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f0000000840)=0xc) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@broadcast, @in6}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000880)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6=@remote, @in6=@remote}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000bc0)=0xe8) getresuid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000f00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) getgroups(0x0, &(0x7f0000000fc0)) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) lstat(&(0x7f0000001300)='./file0\x00', &(0x7f00000013c0)) stat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) setxattr$system_posix_acl(&(0x7f0000000180)='./file1\x00', &(0x7f0000000740)='system.posix_acl_default\x00', &(0x7f0000001240), 0x24, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getuid() getresuid(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f00000008c0)=""/246) syz_execute_func(&(0x7f00000007c0)="42805da0ca24a3a3ef6955da0f01ee0dcececbff9191a33d06a9003e2877fdfd993d233d234142d85d0964ab660f38302f400fc77a20450f2e1ac4010d64ac1e5d31a3b7e29873bbc4213d6aac7903000000") 03:34:26 executing program 5: request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000500), &(0x7f0000000540)=']{\x00', 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") 03:34:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) 03:34:26 executing program 1: pipe2(&(0x7f0000000000), 0x897a583f93a15785) accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0xfdf1) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000005c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005d00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005e00)={{{@in6=@mcast2, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000005f00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006000)={'ip6gretap0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006040)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006080)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000060c0)={{{@in=@remote, @in=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast2}}, &(0x7f00000061c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000063c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006400)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006480), &(0x7f00000064c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006580)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000065c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006740)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006780)={{{@in=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000006880)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006940)={'ipddp0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006980)={'bridge0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000069c0)={@loopback, @loopback}, &(0x7f0000006a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40), &(0x7f0000006a80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000006ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006b00)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000006b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006bc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006c00)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006dc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'veth1_to_bond\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006fc0)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f00000070c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007100)={@dev, @multicast2}, &(0x7f0000007140)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000007180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000071c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000007200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007240)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000007380)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000073c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007400)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007440)={@remote}, &(0x7f0000007480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000074c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000007500)={@rand_addr, @rand_addr}, &(0x7f0000007540)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000082c0)={&(0x7f00000000c0), 0xc, &(0x7f0000008280)={&(0x7f0000007580)={0x14}, 0x14}}, 0x0) lookup_dcookie(0x0, &(0x7f0000000340)=""/232, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000200)="42805da0c20f460f46dc0f01ee2632206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6828adfe2c579987e") 03:34:26 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) fstat(0xffffffffffffff9c, &(0x7f0000000280)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getgid() stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) setfsgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)=""/243, 0xf3) timerfd_create(0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000640)) fcntl$getflags(0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getresgid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000003c0)) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 03:34:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000040)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") gettid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)) 03:34:27 executing program 5: request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000500), &(0x7f0000000540)=']{\x00', 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") 03:34:27 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000903000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0690fef69dc00d9ce41ff0f1837dfcf0f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b7c421fde631e2989f7f") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000080)) memfd_create(&(0x7f00000001c0)='./cgroup.net/syz1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000980)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000ac0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getresgid(&(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)) getpid() lstat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f00000017c0)=0xe8) getgid() getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@loopback, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001a80)=0xe8) stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) pipe(&(0x7f0000001dc0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001e00)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003280)={{{@in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000003380)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) geteuid() getgroups(0x0, &(0x7f0000003440)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003580)=0xe8) getegid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getegid() getpgrp(0x0) stat(&(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)) getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003b00), &(0x7f0000003b40)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c80), 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000580)=0xe8) 03:34:27 executing program 0: unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bdc038016dfa19fa762b4242218f8978972bf0817e768cc80000000081b5e5b82b870000002167670fbab204000000ca4b2178dae5e54175450f2e1ac46279db6744c4e1e1666f0771fb0703") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000005c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) rt_sigpending(&(0x7f0000000040), 0x8) pipe2(&(0x7f0000000080), 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000480)={{}, 'syz0\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) getpgid(0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0x7b) getgid() fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000500)) accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @broadcast}, &(0x7f00000005c0)=0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000440)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x0, @multicast2}, 'syz_tun\x00'}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in, @in6=@mcast1}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) 03:34:27 executing program 4: prctl$setmm(0x23, 0x2, &(0x7f0000ffc000/0x4000)=nil) keyctl$set_reqkey_keyring(0x7, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @remote}, &(0x7f0000000200)=0x6c) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x989680}, &(0x7f0000000700), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000002c0)=""/165) mlock2(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000040)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:34:27 executing program 5: request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000500), &(0x7f0000000540)=']{\x00', 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") 03:34:28 executing program 5: request_key(&(0x7f0000000240)='keyring\x00', &(0x7f0000000500), &(0x7f0000000540)=']{\x00', 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") 03:34:28 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000004480)) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0xb8, 0x0, &(0x7f00000044c0)) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000004500)={@mcast2, @mcast1, @loopback}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000004580)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}, 'ip6gretap0\x00'}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val, @void, @x25}, 0x7) 03:34:28 executing program 0: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x25, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 03:34:28 executing program 4: unshare(0x2fffd) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) ptrace(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:29 executing program 1: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in=@remote, @in=@remote}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'team0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000002a00), 0x0, 0x0, &(0x7f0000001980)={0x0, 0x1c9c380}) accept4$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002b80)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002bc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003000)={'veth1_to_bridge\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000032c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003340)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000039c0), &(0x7f0000003a00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003a40)={{{@in6=@dev, @in6}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000003b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003b80)={'veth0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000051c0)={@local}, &(0x7f0000005200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000005240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005280)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000052c0)={'veth0_to_bond\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005300)={{{@in=@broadcast, @in=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000005400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005480)={@mcast2}, &(0x7f00000054c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005680)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000056c0)={'ip_vti0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000005d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005dc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005e00), &(0x7f0000005e40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005ec0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005fc0)={0x0, @loopback, @remote}, &(0x7f0000006000)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006040)={0x0, @local, @loopback}, &(0x7f0000006080)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000060c0)={'team0\x00'}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:29 executing program 0: sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000140)) timer_gettime(0x0, &(0x7f00000001c0)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) getpgid(0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f0000000780)=ANY=[]) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) bind$inet(0xffffffffffffffff, &(0x7f0000000200), 0x10) 03:34:29 executing program 5: prctl$intptr(0x24, 0x20000040206) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000780)='./file0\x00'}, 0x10) pipe2(&(0x7f0000000440), 0x0) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000240)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000480)=0xc) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000600)=""/208) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000800)='./file0\x00', 0x8, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000700), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000004c0)='^bdevposix_acl_access\\+.\x00'}, 0xfffffffffffffd0d) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@dev, @local}, &(0x7f0000000880)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, 0xe8) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000007c0)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000009c0)='cgroup.subtree_control\x00', 0x2, 0x0) pipe2$9p(&(0x7f00000003c0), 0x0) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={0xffffffffffffffff, 0x0, 0x0, 0xe7, &(0x7f0000000340), &(0x7f0000000500)=""/231}, 0x28) pipe(&(0x7f00000000c0)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000280)) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000700)={0xdfcea7cf8c344479}, 0x7) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000840), 0x4) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000200)) 03:34:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000100)=0xc8) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b40)=""/38, 0x26}}], 0x1, 0x0, 0x0) shutdown(r2, 0x1) [ 3281.572059] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:34:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000100)=0xc8) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b40)=""/38, 0x26}}], 0x1, 0x0, 0x0) shutdown(r2, 0x1) 03:34:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000100)=0xc8) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b40)=""/38, 0x26}}], 0x1, 0x0, 0x0) shutdown(r2, 0x1) 03:34:30 executing program 3: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000040)='\x00') msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) chroot(&(0x7f0000000280)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000e40)='ppp1[\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002300)) lstat(&(0x7f0000002340)='./file0/file0\x00', &(0x7f0000002380)) stat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) getpgid(0xffffffffffffffff) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)={{{@in=@remote, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002640)=0xe8) getgroups(0x0, &(0x7f0000002680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003880), &(0x7f00000038c0)=0xc) lstat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) fstat(0xffffffffffffffff, &(0x7f00000039c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) lstat(&(0x7f0000003b00)='./file0\x00', &(0x7f0000003b40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c00), 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000000c0)={0x0, @rand_addr, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x0, 0x0, &(0x7f0000000100)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sed\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") [ 3282.354365] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:34:30 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], &(0x7f0000000180)='wlan0eth1trusted*}\x00', 0x13, 0x0) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:34:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000100)=0xc8) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b40)=""/38, 0x26}}], 0x1, 0x0, 0x0) shutdown(r2, 0x1) 03:34:30 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000004480)) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0xb8, 0x0, &(0x7f00000044c0)) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000004500)={@mcast2, @mcast1, @loopback}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000004580)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}, 'ip6gretap0\x00'}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val, @void, @x25}, 0x7) 03:34:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000100)=0xc8) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b40)=""/38, 0x26}}], 0x1, 0x0, 0x0) shutdown(r2, 0x1) 03:34:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000100)=0xc8) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b40)=""/38, 0x26}}], 0x1, 0x0, 0x0) shutdown(r2, 0x1) 03:34:31 executing program 1: inotify_init() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@mcast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in=@broadcast, @in=@dev}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000001c0)={0x77359400}, 0x10) geteuid() getuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000005c0)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000200)={0x0, @aes256, 0x0, "1bb7a216d653c0aa"}) getgroups(0x0, &(0x7f0000000640)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000880)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000a40)=ANY=[], 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:34:31 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="153f6234488dd25d766070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x800000005452, &(0x7f0000000100)=0xc8) recvmmsg(r1, &(0x7f0000002b80)=[{{&(0x7f0000000080)=@hci, 0x80, &(0x7f0000002ac0), 0x0, &(0x7f0000002b40)=""/38, 0x26}}], 0x1, 0x0, 0x0) shutdown(r2, 0x1) 03:34:31 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x200000, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000700)='./file0\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000001540)='keyring\x00', &(0x7f0000001580), 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001600), 0x4) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000015c0)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000000)=0x78) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0), &(0x7f0000000080)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/234) close(0xffffffffffffffff) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000340)) renameat2(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@dev, @in=@local}}, {{@in=@multicast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000ac0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000b00)=@can, &(0x7f0000000b80)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001000)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000011c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001240)={@rand_addr, @broadcast}, &(0x7f0000001280)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000012c0)={@mcast1}, &(0x7f0000001300)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000013c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001400)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000019c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001d00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001d40)={@dev, @broadcast}, &(0x7f0000001d80)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000001fc0)={&(0x7f0000001dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000001f80)}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002000)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002040)={{{@in6, @in6=@dev}}, {{@in6=@dev}}}, &(0x7f0000002140)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002180)={@dev}, &(0x7f00000021c0)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f0000000740), 0xc, &(0x7f0000002800)={&(0x7f0000002200)=ANY=[]}}, 0x0) symlink(&(0x7f0000000300)='./file1\x00', &(0x7f0000000240)='./file0\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000600)=0x14) syz_execute_func(&(0x7f0000000280)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:31 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], &(0x7f0000000180)='wlan0eth1trusted*}\x00', 0x13, 0x0) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:34:31 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000004480)) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0xb8, 0x0, &(0x7f00000044c0)) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000004500)={@mcast2, @mcast1, @loopback}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000004580)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}, 'ip6gretap0\x00'}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val, @void, @x25}, 0x7) 03:34:32 executing program 4: getresuid(&(0x7f0000000600), &(0x7f0000000680), &(0x7f00000006c0)) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000480)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000000c0)={'vlan0\x00'}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f0000000100), 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffbd, 0x0, 0x2}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f00000004c0)=""/153, 0x99, 0x0, &(0x7f0000000580)=@file={0x0, './file0\x00'}, 0x6e) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[]}}, 0x0) 03:34:33 executing program 3: mlock2(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000200)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@remote, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffff9c, &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f00000002c0)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000300)={{}, {0x0, 0x989680}}, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") setregid(0x0, 0x0) 03:34:33 executing program 5: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:34:33 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], &(0x7f0000000180)='wlan0eth1trusted*}\x00', 0x13, 0x0) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:34:33 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000004480)) recvmmsg(0xffffffffffffffff, &(0x7f0000000180), 0xb8, 0x0, &(0x7f00000044c0)) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000004500)={@mcast2, @mcast1, @loopback}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000004580)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @multicast1}, 'ip6gretap0\x00'}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@val, @void, @x25}, 0x7) 03:34:33 executing program 4: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getresuid(&(0x7f00000004c0), &(0x7f0000000580), &(0x7f00000005c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:34:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0x1, 0x200000010, &(0x7f0000000040)=0x1, 0x4) write$binfmt_elf32(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="ff"], 0x1) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000100)=0x54) recvmmsg(r2, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000002b00), 0x185, &(0x7f0000002b80)=""/62, 0xa4}}], 0x5e2, 0x0, 0x0) 03:34:34 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], &(0x7f0000000180)='wlan0eth1trusted*}\x00', 0x13, 0x0) syz_execute_func(&(0x7f0000000780)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:34:34 executing program 5: set_tid_address(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) getegid() geteuid() lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getgroups(0x0, &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) stat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgid() syz_execute_func(&(0x7f0000000300)="408055a05f6969ef69dc00d9c421a05d2f8a20f2420f58410d8f6840cf880e00000001cdaeab3138211a40a5c441657538c48391683f000f01efe5e57d0f66f3f081900c0000007400653666400f55aa07000000e59a01460f01ee45ffde9f") 03:34:34 executing program 4: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getresuid(&(0x7f00000004c0), &(0x7f0000000580), &(0x7f00000005c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:34:34 executing program 5: chdir(&(0x7f0000000200)='./file0\x00') lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) getegid() openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000008c0)=0xe8) getresgid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)) keyctl$set_reqkey_keyring(0xe, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@dev, @remote}, &(0x7f0000000080)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000009c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000b00)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[]}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000005c0)) getpgrp(0x0) 03:34:35 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'rose0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@rand_addr, @broadcast}, &(0x7f0000000a40)=0xffffffffffffffce) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d40)={@ipv4={[], [], @dev}}, &(0x7f0000000d80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000dc0)={0x0, @local, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@remote, @remote}, &(0x7f0000000f40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000010c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in=@loopback, @in=@local}}, {{@in=@multicast2}}}, &(0x7f0000001200)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001280)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000014c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001dc0), 0x0, 0x0, &(0x7f0000001e00)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001fc0)={{{@in, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000020c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000023c0)={@empty, @multicast1}, &(0x7f0000002400)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002500)={0x0, @loopback, @multicast2}, &(0x7f0000002540)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002640)={0x0, @local, @dev}, &(0x7f0000002680)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002880), &(0x7f00000028c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002a80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002ac0), &(0x7f0000002b00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000480), 0xc, &(0x7f0000003440)={&(0x7f00000034c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) 03:34:35 executing program 4: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getresuid(&(0x7f00000004c0), &(0x7f0000000580), &(0x7f00000005c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:34:35 executing program 3: prctl$setname(0xf, &(0x7f0000000040)='bdevselfcgroupself') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000840)="428055a0b2878769ef69dc00d9868441ff0f1837373addc422d50b20c1906986fbd9f28f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042aff4333358b70647ff745c1e1f7f") ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000240)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000200)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000180)) 03:34:35 executing program 1: rt_sigaction(0x0, &(0x7f0000000240)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0xfdbc, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1f8, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)="6370756163a2b1b7686897fd661063742e75736167655f7065726370835f757365721aef58ac8aa7cbe2b3ac62381a6788c913096e255d1deb5881ef21a5e8362f3ff337c5f73f4862361af20621013f69aeb7188a4d362afc4a87bcd3d73f7ac8666a9f0199cb94b25ce923fa1aca98cccab0b0244517d8dacdd3", 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 03:34:35 executing program 2: stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getresgid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004f40)={{{@in6=@mcast2}}, {{@in6}}}, &(0x7f0000005040)=0xe8) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000007c0)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000800)=0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) getegid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005080), &(0x7f00000050c0)=0xc) getresuid(&(0x7f00000054c0), &(0x7f0000005500), &(0x7f0000005540)) fstat(0xffffffffffffffff, &(0x7f0000005580)) getresuid(&(0x7f0000005600), &(0x7f0000005640), &(0x7f0000005680)) getresgid(&(0x7f00000056c0), &(0x7f0000005700), &(0x7f0000005740)) getresuid(&(0x7f0000005780), &(0x7f00000057c0), &(0x7f0000005800)) getegid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000840), 0x12) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) getuid() getegid() unlink(&(0x7f0000000080)='./file0\x00') geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005f80), &(0x7f0000005fc0)=0xc) 03:34:35 executing program 5: memfd_create(&(0x7f0000000140)='\'\\+}ppp0\x00', 0x0) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@generic, &(0x7f0000000440)=0xffffffffffffff63, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f00000005c0), 0x0, 0xfffffffffffffff9) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f00000004c0)={'syzkaller1\x00', @ifru_addrs=@xdp}) recvfrom$packet(0xffffffffffffffff, &(0x7f00000015c0)=""/4096, 0x1000, 0x0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffffe) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/68) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:36 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'rose0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@rand_addr, @broadcast}, &(0x7f0000000a40)=0xffffffffffffffce) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d40)={@ipv4={[], [], @dev}}, &(0x7f0000000d80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000dc0)={0x0, @local, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@remote, @remote}, &(0x7f0000000f40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000010c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in=@loopback, @in=@local}}, {{@in=@multicast2}}}, &(0x7f0000001200)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001280)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000014c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001dc0), 0x0, 0x0, &(0x7f0000001e00)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001fc0)={{{@in, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000020c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000023c0)={@empty, @multicast1}, &(0x7f0000002400)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002500)={0x0, @loopback, @multicast2}, &(0x7f0000002540)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002640)={0x0, @local, @dev}, &(0x7f0000002680)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002880), &(0x7f00000028c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002a80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002ac0), &(0x7f0000002b00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000480), 0xc, &(0x7f0000003440)={&(0x7f00000034c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) 03:34:36 executing program 4: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getresuid(&(0x7f00000004c0), &(0x7f0000000580), &(0x7f00000005c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 03:34:36 executing program 5: recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/44, 0x2c, 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000900)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000600)={'nat\x00', 0x0, 0x0, 0xe6, [], 0x0, &(0x7f0000000440), &(0x7f0000000500)=""/230}, &(0x7f00000002c0)=0x78) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000800)={&(0x7f0000000780)='cgroup.subtree_control\x00'}, 0x10) dup(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000006c0)=0x12) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:34:36 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'rose0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@rand_addr, @broadcast}, &(0x7f0000000a40)=0xffffffffffffffce) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d40)={@ipv4={[], [], @dev}}, &(0x7f0000000d80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000dc0)={0x0, @local, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@remote, @remote}, &(0x7f0000000f40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000010c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in=@loopback, @in=@local}}, {{@in=@multicast2}}}, &(0x7f0000001200)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001280)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000014c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001dc0), 0x0, 0x0, &(0x7f0000001e00)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001fc0)={{{@in, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000020c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000023c0)={@empty, @multicast1}, &(0x7f0000002400)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002500)={0x0, @loopback, @multicast2}, &(0x7f0000002540)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002640)={0x0, @local, @dev}, &(0x7f0000002680)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002880), &(0x7f00000028c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002a80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002ac0), &(0x7f0000002b00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000480), 0xc, &(0x7f0000003440)={&(0x7f00000034c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) 03:34:36 executing program 4: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000002c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000340)='big_key\x00', &(0x7f0000000380)='cpu.stat\x00') syz_execute_func(&(0x7f0000000400)="428055a0ad6969ef69dc00d99069203737c33bc481d8145200060f38792117172564a70f157a9e660f478431508c0000e5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) clock_getres(0x0, &(0x7f00000003c0)) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) syz_genetlink_get_family_id$team(&(0x7f0000000500)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in=@local}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000840)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@local, @rand_addr}, &(0x7f0000000d40)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000d80), &(0x7f0000000dc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000f80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001780)={@loopback}, &(0x7f00000017c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001800)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000001900)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001940)={@mcast2}, &(0x7f0000001980)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000019c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000001ac0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b00)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000001c00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001e00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001f00)={@multicast1, @remote}, &(0x7f0000001f40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f80)={0x0, @broadcast, @remote}, &(0x7f0000001fc0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002000)={'bond_slave_0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002040)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000002140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000002280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000022c0)={{{@in=@local, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000023c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002480)={{{@in=@broadcast, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000002580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003840)={{{@in=@remote, @in=@local}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000003940)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000003980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000039c0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003a00)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003a40)={'syzkaller0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003b40), &(0x7f0000003b80)=0xc) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000000240), 0xc, &(0x7f0000004600)={&(0x7f0000003bc0)={0x14}, 0x14}}, 0x0) 03:34:37 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffb) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) seccomp(0x1, 0x0, &(0x7f0000000c80)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:34:37 executing program 0: perf_event_open(&(0x7f00000001c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'rose0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@rand_addr, @broadcast}, &(0x7f0000000a40)=0xffffffffffffffce) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d40)={@ipv4={[], [], @dev}}, &(0x7f0000000d80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000dc0)={0x0, @local, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@remote, @remote}, &(0x7f0000000f40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f80)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000010c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in=@loopback, @in=@local}}, {{@in=@multicast2}}}, &(0x7f0000001200)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001280)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000014c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001dc0), 0x0, 0x0, &(0x7f0000001e00)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e40)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001fc0)={{{@in, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000020c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000023c0)={@empty, @multicast1}, &(0x7f0000002400)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002500)={0x0, @loopback, @multicast2}, &(0x7f0000002540)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002640)={0x0, @local, @dev}, &(0x7f0000002680)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002880), &(0x7f00000028c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002a80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002ac0), &(0x7f0000002b00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000480), 0xc, &(0x7f0000003440)={&(0x7f00000034c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) 03:34:37 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) syz_open_procfs(0x0, &(0x7f0000000140)='net/raw6\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") 03:34:39 executing program 3: getrusage(0x0, &(0x7f0000000240)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000440)=0xc) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000005c0)=""/85) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000480)) fstat(0xffffffffffffffff, &(0x7f00000004c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f00000002c0)=""/77) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000540)) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140), &(0x7f0000001380), 0x0, 0xfffffffffffffffb) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000380)=""/167) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) keyctl$describe(0x6, 0x0, &(0x7f0000001440)=""/75, 0x4b) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) socket$packet(0x11, 0x0, 0x300) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 03:34:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10c3}, 0xffffffffffffff83) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) 03:34:39 executing program 0: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) getrlimit(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) getuid() getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) getegid() getuid() 03:34:39 executing program 1: personality(0x0) clock_settime(0x0, &(0x7f0000000280)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) creat(&(0x7f0000000080)='./file0\x00', 0x0) socket$inet6(0xa, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000000440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000005c0)={0x0, @loopback}, &(0x7f0000000600)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000740)=0x14, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000480)=""/233) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in6=@dev, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000880)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@multicast2, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000ac0)={0x0, @multicast2, @multicast2}, &(0x7f0000000b00)=0xc) readlinkat(0xffffffffffffffff, &(0x7f0000000580)='./file1\x00', &(0x7f00000008c0)=""/135, 0x87) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f0000000240)) accept$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000014c0)={0x0, @empty, @multicast1}, &(0x7f0000001500)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f00000002c0), 0xc, &(0x7f0000001800)={&(0x7f0000001540)={0x14}, 0x14}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000040)={0x14}, 0x14) 03:34:39 executing program 2: unshare(0x4000000) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) accept4(0xffffffffffffff9c, &(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0), 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[]}}, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000100)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000900)=""/4096) ustat(0x0, &(0x7f0000000140)) openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3845c44379dfb9d6adbe90dfe2989f7f") 03:34:39 executing program 5: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/110, 0x6e) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)) getrandom(&(0x7f0000000040)=""/148, 0x94, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b80)={0x0, 0x0, 0x0, &(0x7f0000000b00)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000480)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000400), 0x9, &(0x7f0000000780)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in=@dev, @in=@loopback}}, {{@in6}}}, &(0x7f00000005c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'veth1_to_bridge\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000cc0), 0xc, &(0x7f0000000e40)={&(0x7f0000000d40)=@delqdisc={0x24}, 0x24}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000680)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, "7b4b731cfc129e9c11a15f8d7c20052c006a85ae0f297f9e66f54bb0f8a66dac7bcdfa75e87425bbb0880bed2efafbd6324314d8f5d1188406016b161ea9c6aed5e670126f2ab032ba1221646e87ca24"}, 0xd8) stat(&(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)) clock_gettime(0x0, &(0x7f0000000c40)) rt_sigtimedwait(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c80), 0x8) 03:34:39 executing program 4: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@remote}}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@local, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) memfd_create(&(0x7f0000000340)="6946813df830007c396fc317236b407c44226e34d42e7cb2d79ac52d7ab3b2c24b5a5d3e9206da56b29d3dd1a2a19e6a3a0b61d01abb6665695a0524c4abea87a5c11f651c6c4ff7b36e3f819847ee23c4d2723562dec0c3c8", 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 03:34:40 executing program 5: ustat(0x0, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[]}}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000140)=0x1e) 03:34:40 executing program 0: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)="6b657972696e676b657972696e67cd6370757365747b2c656d31626465765e5b2300"}, 0x10) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000003c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @cond}}) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') eventfd(0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000700)='blacklist\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0xfffffffffffffffc) keyctl$link(0x8, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) clock_gettime(0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000001c0)={'gretap0\x00'}) syz_open_procfs(0x0, &(0x7f0000000540)='net/dev\x00') ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000005c0)=@req={0x28, &(0x7f0000000580)={'gre0\x00', @ifru_mtu}}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:34:40 executing program 4: getrlimit(0xfffffffffffffffc, &(0x7f0000000840)) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") mount(&(0x7f0000000580)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') mprotect(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000240), &(0x7f0000000d00), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000380)=""/58) recvmmsg(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f470f3800c4c439582a060f38211a40a5c19084d98fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e298673640dfc2c4837d4b6d0500") 03:34:40 executing program 4: getrlimit(0xfffffffffffffffc, &(0x7f0000000840)) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") mount(&(0x7f0000000580)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') mprotect(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000240), &(0x7f0000000d00), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000380)=""/58) recvmmsg(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f470f3800c4c439582a060f38211a40a5c19084d98fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e298673640dfc2c4837d4b6d0500") 03:34:40 executing program 4: getrlimit(0xfffffffffffffffc, &(0x7f0000000840)) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") mount(&(0x7f0000000580)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') mprotect(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000240), &(0x7f0000000d00), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000380)=""/58) recvmmsg(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f470f3800c4c439582a060f38211a40a5c19084d98fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e298673640dfc2c4837d4b6d0500") 03:34:42 executing program 3: chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000800)={'vlan0\x00'}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) prctl$setendian(0x14, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) memfd_create(&(0x7f0000000400)='}userloem0!,\x00', 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000340)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f00000007c0)) geteuid() add_key$keyring(&(0x7f0000000640)='keyring\x00', &(0x7f0000000780), 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) request_key(&(0x7f00000005c0)='rxrpc_s\x00', &(0x7f00000006c0), &(0x7f0000000700)='}bdev.selinux\x00', 0xfffffffffffffffa) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000880), &(0x7f00000008c0)=0x4) request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000740)='self\x00', 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@dev}, &(0x7f0000000380)=0x20) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:34:42 executing program 4: getrlimit(0xfffffffffffffffc, &(0x7f0000000840)) clock_gettime(0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") mount(&(0x7f0000000580)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000c00)='bdev\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') mprotect(&(0x7f0000dfe000/0x200000)=nil, 0x200000, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) add_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f0000000240), &(0x7f0000000d00), 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000380)=""/58) recvmmsg(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f470f3800c4c439582a060f38211a40a5c19084d98fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e298673640dfc2c4837d4b6d0500") 03:34:42 executing program 5: ustat(0x0, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[]}}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000140)=0x1e) 03:34:42 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000280)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000140)='user.syz\x00'}, 0x30) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000a40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) getegid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/access\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000d00)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000d40)='/dev/rtc#\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000300)=@proc, 0xc, &(0x7f0000000700), 0x0, &(0x7f0000000dc0)=ANY=[]}, 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") sync() 03:34:42 executing program 2: readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)=""/119, 0xfffffffffffffe52) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f00000005c0)=0xe8) readlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/80, 0x50) geteuid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fchownat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0c60fef69dc0f01eece410fbaff5719fa380f38ac2121f3f081768cc8000000c4d181b5e5bc6b1000002121f00fbab204000000ca650f38c812dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 03:34:42 executing program 1: geteuid() sysinfo(&(0x7f0000000580)=""/4096) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x0, 0x0) accept(0xffffffffffffff9c, &(0x7f0000001ac0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000001b40)=0x80) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001bc0)={&(0x7f0000001b80)='./file0\x00'}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000003000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) accept(0xffffffffffffffff, &(0x7f0000001c80)=@sco, &(0x7f0000001d00)=0x80) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000001d40)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001d80)='/selinux/mls\x00', 0x0, 0x0) gettid() getresuid(&(0x7f0000001f80), &(0x7f0000001fc0), &(0x7f0000002000)) stat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002100), &(0x7f0000002140)=0xc) lstat(&(0x7f0000002180)='./file0\x00', &(0x7f00000021c0)) fstat(0xffffffffffffffff, &(0x7f0000002240)) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00', &(0x7f0000000140)=""/103, 0x67) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002640), &(0x7f0000002680)=0xc) fstat(0xffffffffffffff9c, &(0x7f00000026c0)) stat(&(0x7f0000002740)='./file0\x00', &(0x7f0000002780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a032c4c27d598c331a000000ffaa183736e33addc422d5f2a68f097002cc9f66410b850f0000004205c7c7f2217ce61a0feefac4027d183352c4e119fddd4008356d0000000000753242afa03333420f709427771a69a500e3c4c13b7c1226b0f0b1316767f340a6212dfcd4a10200002666430ffb348b") 03:34:42 executing program 4: setpriority(0x2, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ff9000/0x3000)=nil, 0x3000}, &(0x7f0000000300)=0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='&securitybdev.mime_type\x00', 0x0) getpgrp(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000001100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) accept$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000280)=0x1c) getuid() fstat(0xffffffffffffffff, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000200)=0xe8) getresuid(&(0x7f00000010c0), &(0x7f0000001080), &(0x7f0000000540)) memfd_create(&(0x7f0000000040)='bdev[bdevQem1\x00', 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000140)) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) clock_gettime(0x0, &(0x7f0000000280)) socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000800)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@dev, @in=@broadcast}}}, &(0x7f0000000840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000a80)) [ 3293.925423] audit: type=1326 audit(2000000082.231:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=23088 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:42 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000280)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000140)='user.syz\x00'}, 0x30) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000a40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) getegid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/access\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000d00)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000d40)='/dev/rtc#\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000300)=@proc, 0xc, &(0x7f0000000700), 0x0, &(0x7f0000000dc0)=ANY=[]}, 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") sync() [ 3294.269102] audit: type=1326 audit(2000000082.575:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=23105 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:42 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000280)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000140)='user.syz\x00'}, 0x30) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000a40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) getegid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/access\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000d00)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000d40)='/dev/rtc#\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000300)=@proc, 0xc, &(0x7f0000000700), 0x0, &(0x7f0000000dc0)=ANY=[]}, 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") sync() 03:34:42 executing program 5: ustat(0x0, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[]}}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000140)=0x1e) [ 3294.615459] audit: type=1326 audit(2000000082.922:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=23112 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:43 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f0000000340), &(0x7f0000000280)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000140)='user.syz\x00'}, 0x30) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.swap.current\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000600)='/dev/input/event#\x00', 0x0, 0x0) getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000b00)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000a40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000c80)=0xe8) getegid() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/access\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000d00)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000d40)='/dev/rtc#\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000e40)={&(0x7f0000000300)=@proc, 0xc, &(0x7f0000000700), 0x0, &(0x7f0000000dc0)=ANY=[]}, 0x0) futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") sync() 03:34:43 executing program 4: inotify_init() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) shutdown(0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000440), 0x8) openat$urandom(0xffffffffffffff9c, &(0x7f0000000400)='/dev/urandom\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f0000000040)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000380)) close(0xffffffffffffffff) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000140)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000280)={'IDLETIMER\x00'}, &(0x7f0000000240)=0x2ca) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000080)) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000500)) [ 3294.967356] audit: type=1326 audit(2000000083.274:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=23126 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:43 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x1, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002380)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) 03:34:43 executing program 2: ioprio_set$uid(0x3, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000006800), 0x0, 0x0, &(0x7f0000006a00)) syz_genetlink_get_family_id$team(&(0x7f0000006a80)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006ac0)={@loopback}, &(0x7f0000006b00)=0x14) accept(0xffffffffffffffff, &(0x7f000000a340)=@hci, &(0x7f000000a3c0)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a400), &(0x7f000000a440)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a480)={'veth1\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in=@remote, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f000000a680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000a6c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f000000a7c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f000000a800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a840)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000ad40)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f000000ae40)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000ae80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000aec0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000b380)={'tunl0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b3c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f000000b4c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b700)={{{@in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f000000b800)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b840)={@local, @rand_addr}, &(0x7f000000b880)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b8c0)={{{@in=@multicast1, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f000000b9c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ba00)={{{@in6=@mcast1, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f000000bb00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000bb40)={@loopback}, &(0x7f000000bb80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000be80)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f000000bf80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bfc0)={{{@in=@dev, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000004fc0)=0x57) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f000000c100)={{{@in6, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f000000c200)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c780)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ce00)={&(0x7f0000006a40), 0xc, &(0x7f000000cdc0)={&(0x7f000000c7c0)={0x14}, 0x14}}, 0x0) 03:34:43 executing program 0: mlock2(&(0x7f000000c000/0x1000)=nil, 0x1000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000040)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) bpf$MAP_CREATE(0x0, &(0x7f0000000340), 0x2c) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000080)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000280)) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 03:34:43 executing program 5: ustat(0x0, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000280)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_create(0x0, 0x0) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[]}}, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000140)=0x1e) 03:34:44 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:44 executing program 5: mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f0000000340)=0x40) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="42805da0ca24a3a3ef69dc0f01ee0dce41cbc4c1965382be000000290028770f80a76be53d237342d85d09f244a4660f38302fbae5e5e57567470fe3ba02d43c28010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) socket$inet(0x2, 0x0, 0x0) 03:34:44 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f00000005c0)=0xc) open(&(0x7f0000000680)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000000e40), 0x8) syz_open_pts(0xffffffffffffff9c, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/uhid\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000ec0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000f00)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000f40)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000f80)='/dev/loop-control\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/loop-control\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket(0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000001040)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001080)) openat$keychord(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/keychord\x00', 0x0, 0x0) memfd_create(&(0x7f0000001100)="283a6b657972696e67e67573657200", 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000001140)='cgroup.subtree_control\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000011c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001240)) socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000001280)) eventfd(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/ppp\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001300)='/selinux/access\x00', 0x2, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f00000013c0)='/selinux/access\x00', 0x2, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001400)='/selinux/load\x00', 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001440)='/dev/ptmx\x00', 0x0, 0x0) dup(0xffffffffffffffff) socket(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001480)='/dev/net/tun\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001e80)='/selinux/access\x00', 0x2, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000001ec0)='/selinux/relabel\x00', 0x2, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000001f00), 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001f80)='ns/net\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002000)=0x14, 0x0) timerfd_create(0x0, 0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000002040)) socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000002080)='/selinux/member\x00', 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f00000020c0)='/selinux/access\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002200), 0x0, 0x0) quotactl(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, &(0x7f0000000600)) epoll_create(0x0) inotify_init() openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000480)={0x0, &(0x7f0000000400)}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:45 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:45 executing program 5: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x3dc}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x6}, 0x28, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) connect(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:34:45 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f0000001a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001d80)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000001dc0)) inotify_init() accept$unix(0xffffffffffffff9c, &(0x7f0000001e40)=@abs, &(0x7f0000001ec0)=0x6e) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001f00)=0xffffffffffffffff, 0x4) signalfd(0xffffffffffffff9c, &(0x7f0000001f40), 0x8) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000001f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000002000)=0x80) accept(0xffffffffffffffff, &(0x7f0000002040)=@l2, &(0x7f00000020c0)=0x80) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002100)) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000003640), 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003680)) socket$key(0xf, 0x3, 0x2) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000037c0)='./file0\x00', &(0x7f0000003800)) getresgid(&(0x7f0000003880), &(0x7f00000038c0), &(0x7f0000003900)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000004f00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000004f40)='autogroup\x00') bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000005040), 0xc) perf_event_open(&(0x7f0000005080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000005100)='io.max\x00', 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000005140)='/dev/input/event#\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000005180)='cgroup.subtree_control\x00', 0x2, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000051c0)) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000006340)={&(0x7f0000005200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000006240)=""/252, 0x1a, 0xfc}, 0x20) accept4$packet(0xffffffffffffffff, &(0x7f0000006380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000063c0)=0x14, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000006400)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="420f0f6f01946969ef69dc00d9f000f200008020d292000000001137370f38211ac46144e2974e2179fb12e5c4a1c9e8dc0f2e1a430f00ce068f0978e3c09f4b") 03:34:45 executing program 3: remap_file_pages(&(0x7f0000008000/0x4000)=nil, 0x500, 0x0, 0x0, 0x0) 03:34:45 executing program 1: execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300), &(0x7f0000000580)) clock_gettime(0x0, &(0x7f0000000800)) clock_nanosleep(0x0, 0x0, &(0x7f0000000340)={0x0, 0x1c9c380}, &(0x7f00000007c0)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe8409f66410b850f000000900bc463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fda0dd4033336d0000000000c4e159751e4180de1b00006464f3446da03333420f709427771a69a5f3430f1021c4c13b7c12c4b641dcfdc9c4427d0d1a84212d2ba58c0000002666430ffb348b1f7f") prctl$seccomp(0x23, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:34:45 executing program 2: ioprio_set$uid(0x3, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:34:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:34:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:34:45 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 03:34:46 executing program 0: getxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)=@random={'btrfs.', '*#(-nodev@\x00'}, &(0x7f0000000500)=""/82, 0x52) ioperm(0x0, 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) getresuid(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000740)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000280), &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) chdir(&(0x7f0000000280)='./file1\x00') syslog(0x0, &(0x7f0000000600)=""/177, 0xb1) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000080), 0x25) open(&(0x7f00000003c0)='./file1\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), &(0x7f0000000340)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) mount(&(0x7f00000006c0)=ANY=[], &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:46 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:46 executing program 3: keyctl$set_reqkey_keyring(0x10, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:34:46 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000180)='/selinux/avc/hash_stats\x00'}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0xffffffffffffffff) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in=@remote, @in6}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000024c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002500), &(0x7f0000002540)=0xc) getpid() lstat(&(0x7f0000002840)='./file0\x00', &(0x7f0000002880)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002940)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000002900)='mime_typesystemwlan1em0\x00', 0xffffffffffffffff}, 0x30) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002d80)) lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) fstat(0xffffffffffffffff, &(0x7f0000002e80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002f00)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002f40)={{{@in6=@dev, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000003040)=0xe8) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f00000030c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003300)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000032c0)='nflog\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000003440)=0xe8) getgroups(0x0, &(0x7f0000003480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000003500)=0xc) getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003980)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003940)="2816626465762d00"}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000039c0), &(0x7f0000003a00)=0xc) lstat(&(0x7f0000003a40)='./file0\x00', &(0x7f0000003a80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003b00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b40)={{{@in=@local, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000003c40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003c80), &(0x7f0000003cc0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003d00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in=@dev, @in=@local}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000003e40)=0xe8) lstat(&(0x7f0000003e80)='./file0\x00', &(0x7f0000003ec0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003f80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000003f40)='}}eth0\x00', 0xffffffffffffffff}, 0x30) 03:34:46 executing program 0: madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@remote, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000007c0)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000008c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in, @in=@loopback}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000a00)=0xe8) getgroups(0x0, &(0x7f0000000a40)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000002c0)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d80)) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) getegid() gettid() geteuid() lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f80)={{{@in6=@ipv4={[], [], @local}, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000001080)=0xe8) getegid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001500)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), 0xfffffffffffffffe) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000017c0)=0xe8) getgroups(0x0, &(0x7f0000001800)) 03:34:47 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:47 executing program 1: getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") uname(&(0x7f0000000300)=""/76) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000180)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[]}}, 0x0) socket$unix(0x1, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") unshare(0x0) getpid() setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000005c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:47 executing program 2: ioprio_set$uid(0x3, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:47 executing program 5: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000e40), 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001f80)="42805da0d10fef69dc0d01ee660f3a608600088041cb913591913d062900770f78996b2179660f38302f3ae5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:47 executing program 5: futex(&(0x7f0000000040), 0x3, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) write$selinux_load(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) write$selinux_load(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000380)={'bond0\x00', {0x2, 0x0, @dev}}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000003c0)={'TPROXY\x00'}, &(0x7f0000000480)=0x1e) memfd_create(&(0x7f0000000200), 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000010c0)) stat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) getresgid(&(0x7f00000011c0), &(0x7f0000001200), &(0x7f0000001240)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001280)) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001380), &(0x7f00000013c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@loopback, @in6}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000001540)=0xe8) stat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001640)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001740)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000033c0), &(0x7f0000003400)=0xc) stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) getgroups(0x0, &(0x7f00000035c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000003700)=0xffffffffffffff5b) fstat(0xffffffffffffffff, &(0x7f0000003740)) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000037c0)={{{@in6=@mcast2, @in6=@ipv4={[], [], @local}}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000038c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003900), &(0x7f0000003940)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d40), &(0x7f0000003d80)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:47 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x43, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000400)) socket$inet6_udp(0xa, 0x2, 0x0) getpid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) getpid() syz_execute_func(&(0x7f0000000080)="428055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000005c0)) getpid() ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)=""/105) futex(&(0x7f00000006c0), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000800), 0x0) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001240)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b00)={0x0, @multicast2, @multicast2}, &(0x7f0000000b40)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80)={@local}, &(0x7f0000000bc0)=0x14) 03:34:47 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:34:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @ipip6={{0x10, 0x1, 'ip6tnl\x00'}, {0x4}}}]}, 0x34}}, 0x0) 03:34:48 executing program 4: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000508ff6)='./control\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00007a7000)='./control\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) preadv(0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) munlockall() seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigpending(&(0x7f0000000680), 0x1) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001640)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001680)={'sit0\x00'}) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) clock_gettime(0x0, &(0x7f0000000140)) [ 3300.479655] audit: type=1326 audit(2000000088.774:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=23277 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:48 executing program 3: clock_getres(0x0, &(0x7f0000000180)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) creat(&(0x7f00000003c0)='./file0\x00', 0x0) inotify_init() openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/access\x00', 0x2, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000980), 0x8, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0), &(0x7f0000000080)=0xffffffffffffff8c, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000fc0)) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() fstat(0xffffffffffffff9c, &(0x7f0000001880)) getegid() syz_open_dev$binder(&(0x7f0000001900)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001940)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001980)='/dev/ashmem\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001a40)='/selinux/mls\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/uinput\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ac0)) getresuid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f00000000c0)) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001c80)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001cc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe09500000000c4027dbc8140af0000ee31a3b786e29885c4227992dd289f9f") 03:34:48 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) epoll_create1(0x0) socket$netlink(0x10, 0x3, 0x0) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000800)='cgroup.type\x00', 0x2, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000840)) inotify_init() socket(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:34:48 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='!\x00', 0xffffffffffffff9c}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000003b40)) rmdir(&(0x7f0000000080)='./file0\x00') syz_execute_func(&(0x7f0000003bc0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d4200ff2ec21a121a12f6585501ee31a3b786e2989fc4227992749f55") ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) creat(&(0x7f0000003b80)='./file0\x00', 0x0) clock_gettime(0x0, &(0x7f0000000300)) recvmmsg(0xffffffffffffffff, &(0x7f0000003940), 0x0, 0x0, &(0x7f0000003ac0)) connect$packet(0xffffffffffffffff, &(0x7f0000003b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) 03:34:48 executing program 1: getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") uname(&(0x7f0000000300)=""/76) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000180)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[]}}, 0x0) socket$unix(0x1, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") unshare(0x0) getpid() setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000005c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:49 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='sit0\x00', 0xfffffffffffffee9) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:34:49 executing program 2: ioprio_set$uid(0x3, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:49 executing program 5: io_destroy(0x0) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") pipe2(&(0x7f0000000140), 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:34:49 executing program 0: syz_extract_tcp_res$synack(&(0x7f00000008c0), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000140), &(0x7f0000000380), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400), &(0x7f0000000440)='\x00', 0xfffffffffffffff9) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000880)) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$void(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000900)=0xe8) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000940), &(0x7f0000000380)}}, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000040)={0x2a3}) keyctl$set_reqkey_keyring(0x4, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000240)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) getpgid(0x0) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000940)="c4a1f8ae1b805da0616969692295d320f3410f2c2c9f6f41ff0f1837370f38211ac19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") [ 3301.631775] audit: type=1326 audit(2000000089.934:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=23291 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:50 executing program 4: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) inotify_init1(0x0) r0 = epoll_create1(0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000028000)={0x4}) openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppp\x00', 0x0, 0x0) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000040)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000380)='cdg\x00', 0x4) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000005c0)=ANY=[], 0x0) ppoll(&(0x7f0000002900)=[{r0, 0x40}], 0x1, &(0x7f00000045c0)={0x77359400}, &(0x7f0000004700), 0x8) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000300)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000340)='./file1\x00', &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:34:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="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") pread64(r0, &(0x7f0000000000), 0x0, 0x0) 03:34:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="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") pread64(r0, &(0x7f0000000000), 0x0, 0x0) 03:34:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="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") pread64(r0, &(0x7f0000000000), 0x0, 0x0) 03:34:50 executing program 3: rt_sigtimedwait(&(0x7f00000005c0), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="8055a0effafa29f4e684e68400d9ce41c4ff0f0f3727ac610f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 03:34:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000280)="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") pread64(r0, &(0x7f0000000000), 0x0, 0x0) 03:34:50 executing program 0: syz_extract_tcp_res$synack(&(0x7f00000008c0), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000140), &(0x7f0000000380), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400), &(0x7f0000000440)='\x00', 0xfffffffffffffff9) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000880)) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$void(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000900)=0xe8) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000940), &(0x7f0000000380)}}, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000040)={0x2a3}) keyctl$set_reqkey_keyring(0x4, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000240)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) getpgid(0x0) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000940)="c4a1f8ae1b805da0616969692295d320f3410f2c2c9f6f41ff0f1837370f38211ac19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:34:50 executing program 1: getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") uname(&(0x7f0000000300)=""/76) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000180)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[]}}, 0x0) socket$unix(0x1, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") unshare(0x0) getpid() setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000005c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:50 executing program 5: setpriority(0x0, 0x0, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) io_setup(0x0, &(0x7f0000000040)) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") [ 3303.411936] audit: type=1326 audit(2000000091.714:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=23339 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4572d9 code=0x0 03:34:51 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") unshare(0x0) 03:34:51 executing program 0: syz_extract_tcp_res$synack(&(0x7f00000008c0), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000140), &(0x7f0000000380), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400), &(0x7f0000000440)='\x00', 0xfffffffffffffff9) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000880)) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$void(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000900)=0xe8) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000940), &(0x7f0000000380)}}, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000040)={0x2a3}) keyctl$set_reqkey_keyring(0x4, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000240)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) getpgid(0x0) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000940)="c4a1f8ae1b805da0616969692295d320f3410f2c2c9f6f41ff0f1837370f38211ac19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:34:51 executing program 2: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000200)) 03:34:51 executing program 5: rt_sigprocmask(0x0, &(0x7f0000000040)={0x6}, &(0x7f00000001c0), 0x8) keyctl$set_timeout(0xf, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(0xffffffffffffffff, &(0x7f0000000780)=""/187, 0xbb, 0x0, &(0x7f0000000700)=@sco, 0x32e) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@known='system.posix_acl_access\x00') getegid() readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/110, 0x6e) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getpeername(0xffffffffffffffff, &(0x7f00000005c0)=@alg, &(0x7f0000000580)=0xfffffffffffffdb4) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) getegid() lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)=""/13, &(0x7f0000000540)=0xd) syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") 03:34:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) memfd_create(&(0x7f00000002c0)="68d903dad7726c", 0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) io_submit(0x0, 0x0, &(0x7f0000001b80)) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000000c0)) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000140)='ip6gretap0\x00', 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') fchmod(0xffffffffffffffff, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000003c0)={{}, 'syz0\x00'}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), 0x4) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[]}}, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) mount(&(0x7f00000000c0)=@loop={'/dev/loop'}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='f2fs\x00', 0x0, &(0x7f0000000300)="68d903dad7726c") seccomp(0x0, 0x0, &(0x7f0000000100)) 03:34:52 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioprio_set$uid(0x0, 0x0, 0x0) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") clock_gettime(0x0, &(0x7f0000000080)) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000300)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000007c0)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000440)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@dev, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000a80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in=@local, @in6}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000ac0)=0xfffffffffffffccd) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c00)=0x14) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) nanosleep(&(0x7f0000000740), &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00'}) fstat(0xffffffffffffffff, &(0x7f0000000340)) getgid() getresgid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000600)) getgroups(0x0, &(0x7f0000000640)) getegid() stat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000680)) 03:34:52 executing program 0: syz_extract_tcp_res$synack(&(0x7f00000008c0), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000140), &(0x7f0000000380), 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400), &(0x7f0000000440)='\x00', 0xfffffffffffffff9) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000880)) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) ioctl$void(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000900)=0xe8) getgid() fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000000940), &(0x7f0000000380)}}, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000040)={0x2a3}) keyctl$set_reqkey_keyring(0x4, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), &(0x7f0000000240)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) getpgid(0x0) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000300)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000940)="c4a1f8ae1b805da0616969692295d320f3410f2c2c9f6f41ff0f1837370f38211ac19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") [ 3305.106071] tmpfs: No value for mount option 'hÙÚ×rl]1£·âóBë{' 03:34:53 executing program 3: rt_sigtimedwait(&(0x7f00000005c0), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="8055a0effafa29f4e684e68400d9ce41c4ff0f0f3727ac610f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 03:34:53 executing program 0: getgroups(0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in=@dev, @in=@multicast1}}, {{@in=@local}}}, &(0x7f0000000580)=0xe8) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[], 0x0, 0x0) dup(0xffffffffffffff9c) pwrite64(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0) getgid() perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) getgid() setgroups(0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d060e0a00000f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:34:53 executing program 5: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x3fffffffffd) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioprio_set$uid(0x0, 0x0, 0x0) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") 03:34:53 executing program 4: getgroups(0x1, &(0x7f00000000c0)=[0xffffffffffffffff]) lstat(&(0x7f00000046c0)='./file1\x00', &(0x7f0000000280)) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000002380), 0x0) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000300)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000200)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000200), 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x14}, 0x14}}, 0x0) futex(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") open(&(0x7f0000004700)='./file1\x00', 0x0, 0x0) 03:34:53 executing program 1: getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") uname(&(0x7f0000000300)=""/76) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000580)='cgroup.type\x00', 0x2, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000180)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[]}}, 0x0) socket$unix(0x1, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") unshare(0x0) getpid() setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000005c0)={'filter\x00', 0x2, [{}, {}]}, 0x48) symlink(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000040)) linkat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:34:54 executing program 4: rename(&(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/mls\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cgroup.controllers\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/status\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) symlink(&(0x7f00000043c0)='./file0\x00', &(0x7f0000000240)='./file0\x00') setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000140)='cubic\x00', 0x6) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f00000000c0)={{0x0, @multicast1, 0x0, 0x0, 'none\x00'}, {@dev}}, 0x44) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2$9p(&(0x7f0000000380), 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000003c0)={0x18}, 0x18) syz_execute_func(&(0x7f0000000280)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000200)}) syz_open_procfs(0x0, &(0x7f0000000040)='net/udp6\x00') gettid() geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) lstat(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000840)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@remote, @in=@broadcast}}, {{@in=@rand_addr}}}, &(0x7f0000000e40)=0xe8) getgid() clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) 03:34:54 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f000000e380), 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)="9e405d00") select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001a80)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b00)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b40)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001c80)={@dev}, &(0x7f0000001cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'bcsh0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000022c0), &(0x7f0000002300)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002340)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000024c0)=0x14) syz_execute_func(&(0x7f0000000180)="428055a0c26969ef69dc00d96566460f3a0d3ec76920375137c339392a8e0f38211a40a50f3706639641801dd261e441801dd261e4417545800f2e1a1a01460f01eef3440fbcee262e6426f30f2b05090000003f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:34:54 executing program 2: prctl$intptr(0x1, 0x0) prctl$void(0x0) dup(0xffffffffffffffff) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000280), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:34:54 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f000000e380), 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)="9e405d00") select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001a80)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b00)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b40)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001c80)={@dev}, &(0x7f0000001cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'bcsh0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000022c0), &(0x7f0000002300)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002340)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000024c0)=0x14) syz_execute_func(&(0x7f0000000180)="428055a0c26969ef69dc00d96566460f3a0d3ec76920375137c339392a8e0f38211a40a50f3706639641801dd261e441801dd261e4417545800f2e1a1a01460f01eef3440fbcee262e6426f30f2b05090000003f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:34:54 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f000000e380), 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)="9e405d00") select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001a80)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b00)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b40)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001c80)={@dev}, &(0x7f0000001cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'bcsh0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000022c0), &(0x7f0000002300)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002340)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000024c0)=0x14) syz_execute_func(&(0x7f0000000180)="428055a0c26969ef69dc00d96566460f3a0d3ec76920375137c339392a8e0f38211a40a50f3706639641801dd261e441801dd261e4417545800f2e1a1a01460f01eef3440fbcee262e6426f30f2b05090000003f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:34:54 executing program 5: keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f00000005c0)=0xc) seccomp(0x0, 0x0, &(0x7f0000001340)={0x0, &(0x7f0000000540)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0x0, &(0x7f00000001c0)='children\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d00)={0x0, @remote, @broadcast}, &(0x7f0000000d40)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000d80), &(0x7f0000000dc0)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'bridge0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)={@remote}, &(0x7f0000000f40)=0xd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@rand_addr, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000010c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002380)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002400)=0xffffffffffffff2d, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000002440)=@xdp, &(0x7f00000024c0)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002540)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000002580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000025c0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003440), 0x0, 0x0, &(0x7f0000003500)={0x77359400}) accept4(0xffffffffffffffff, &(0x7f00000035c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003640)=0x80, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000003b80)={&(0x7f0000003680)=@can, 0x80, &(0x7f0000003ac0), 0x0, &(0x7f0000003b40)=""/40, 0x28}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003c80)={0x0, @local, @rand_addr}, &(0x7f0000003cc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003d00)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000003e00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003e40)={'syz_tun\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)={@dev}, &(0x7f0000000880)=0x119) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003f40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004040)={{{@in6=@mcast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000004140)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000004240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@dev}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f00000043c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000044c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in6=@mcast2}}, &(0x7f0000000c00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000046c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004840)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004980)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000049c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000004ac0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005380)={&(0x7f0000000b40), 0xc, &(0x7f0000005340)={&(0x7f0000000940)=ANY=[]}}, 0x0) getpid() clock_gettime(0x0, &(0x7f0000000580)) setitimer(0x0, &(0x7f0000000600), &(0x7f0000000640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000980)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000500)={0x0, &(0x7f00000004c0)}) add_key(&(0x7f00000008c0)='rxrpc\x00', &(0x7f0000000700), &(0x7f00000008c0), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f0000000a40), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000ac0)='user\x00', &(0x7f0000000b00), &(0x7f0000000b40), 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000a80)='keyring\x00', &(0x7f00000009c0), 0x0, 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000003c0), &(0x7f0000000480)=0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)='trusted.overlay.nlink\x00', &(0x7f0000001300)={'U-', 0x7}, 0x28, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x9}, 0x28, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') 03:34:55 executing program 4: removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="42805da0d10fef69dc0f01ee660f3a608600088041cb3591913d060e0a00000ff38323980feefa6b21798f4810866a00debae5e5e575450f2e1a3828c44379dfb9d6adbe90dfa20fc77112c4633d5d8e030000004b7f") pause() removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.redirect\x00') accept$unix(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000440)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) socket$nl_route(0x10, 0x3, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000480)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) pipe2$9p(&(0x7f00000004c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0xffffffffffffffff}, 0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000540)) signalfd4(0xffffffffffffffff, &(0x7f0000000f00), 0x8, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/access\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) inotify_init1(0x0) timerfd_create(0x0, 0x0) open$dir(&(0x7f0000000640)='./file0\x00', 0x0, 0x0) inotify_init() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000680)) syz_open_dev$binder(&(0x7f00000006c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000700)='cpuset.mem_exclusive\x00', 0x2, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/enforce\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/validatetrans\x00', 0x1, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000800)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/relabel\x00', 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000880)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) geteuid() getgroups(0x0, &(0x7f0000000980)) socket$nl_xfrm(0x10, 0x3, 0x6) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000a40), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000a80)='ns/cgroup\x00') openat$keychord(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/keychord\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/loop-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000bc0)='syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000c40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000c00)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d00)=0x14) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000d40)}, 0x0) 03:34:55 executing program 3: rt_sigtimedwait(&(0x7f00000005c0), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="8055a0effafa29f4e684e68400d9ce41c4ff0f0f3727ac610f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 03:34:55 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f000000e380), 0x0, 0x0, 0x0) add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000200)='.request_key_auth\x00', &(0x7f0000000240)="9e405d00") select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001a80)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001b00)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001b40)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001c80)={@dev}, &(0x7f0000001cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002180)={'bcsh0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000022c0), &(0x7f0000002300)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002340)={'veth0_to_bridge\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'veth1\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000024c0)=0x14) syz_execute_func(&(0x7f0000000180)="428055a0c26969ef69dc00d96566460f3a0d3ec76920375137c339392a8e0f38211a40a50f3706639641801dd261e441801dd261e4417545800f2e1a1a01460f01eef3440fbcee262e6426f30f2b05090000003f") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") 03:34:55 executing program 5: getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001600)) getpgid(0xffffffffffffffff) getpgrp(0x0) dup(0xffffffffffffffff) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f00000002c0)=""/4) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @dev}, &(0x7f0000000400)=0x10) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, 0xfffffffffffffffe, 0x0) splice(0xffffffffffffffff, &(0x7f0000000240), 0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) dup(0xffffffffffffff9c) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000080)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b80)={{{@in=@multicast2, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001c80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000180)=""/24) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:34:55 executing program 5: futex(&(0x7f0000000440), 0xfffffffffffffffe, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211a0f5bdbc19086d9f28fc9f3406d4175450f2e1a8fe978c6978000000022e52b9f26f4c40129154052") 03:34:56 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getrlimit(0x0, &(0x7f0000000280)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:34:56 executing program 4: getrusage(0x1, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000004c0)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1}, 0xc) openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005400)={{{@in=@multicast2, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) getpgid(0x0) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getgroups(0x0, &(0x7f0000000e00)) getpid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000015c0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001980)) getegid() pipe2(&(0x7f0000002100), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f00)) getgid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000044c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000004480)='/dev/keychord\x00'}, 0x30) getgroups(0x0, &(0x7f0000000dc0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgrp(0x0) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004dc0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000004d80)='nbd\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000004e40)) getpid() 03:34:56 executing program 1: timerfd_create(0x7, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) io_cancel(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f0000000340)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socket$nl_generic(0x10, 0x3, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") getpgrp(0xffffffffffffffff) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 03:34:57 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000001340)) memfd_create(&(0x7f0000000480)='*selfposix_acl_access-\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001380)={{{@in, @in6=@ipv4={[], [], @loopback}}}, {{@in6}}}, &(0x7f0000000500)=0xe8) eventfd2(0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), &(0x7f0000001500)=0xfffffffffffffdbd) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000300)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080), 0x4) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000380), 0x4) times(&(0x7f00000001c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in, @in6=@dev}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000640)=0xe23739009f00fd57) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:57 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x101080, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@broadcast, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) geteuid() getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b40), &(0x7f0000002b80)=0xc) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000005c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) geteuid() lstat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000006700)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d80)={{{@in=@dev, @in=@multicast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f0000002e80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f40)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getpgrp(0x0) geteuid() lstat(&(0x7f00000030c0)='./file0\x00', &(0x7f0000003100)) gettid() getresuid(&(0x7f0000003180), &(0x7f00000031c0), &(0x7f0000003200)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000003580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003600)) stat(&(0x7f0000003680)='./file0\x00', &(0x7f00000036c0)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003740)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000003840)=0xe8) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000038c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000003c40)=0xe8) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d80)={{{@in6, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000003e80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), &(0x7f0000003f00)=0xc) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000004040)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffffffffffffffe0) getresgid(&(0x7f0000004200), &(0x7f0000004240), &(0x7f0000004280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000042c0), &(0x7f0000004300)=0xc) geteuid() 03:34:57 executing program 4: getrusage(0x1, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000004c0)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1}, 0xc) openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005400)={{{@in=@multicast2, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) getpgid(0x0) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getgroups(0x0, &(0x7f0000000e00)) getpid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000015c0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001980)) getegid() pipe2(&(0x7f0000002100), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f00)) getgid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000044c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000004480)='/dev/keychord\x00'}, 0x30) getgroups(0x0, &(0x7f0000000dc0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgrp(0x0) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004dc0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000004d80)='nbd\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000004e40)) getpid() 03:34:57 executing program 5: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f00000001c0)="1f0000000104fffff13b54c007110009f30501000b00024000000000050000", 0x1f) 03:34:57 executing program 5: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f00000001c0)="1f0000000104fffff13b54c007110009f30501000b00024000000000050000", 0x1f) [ 3308.781787] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 3308.802687] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 3308.857230] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 03:34:57 executing program 3: rt_sigtimedwait(&(0x7f00000005c0), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="8055a0effafa29f4e684e68400d9ce41c4ff0f0f3727ac610f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 03:34:57 executing program 5: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f00000001c0)="1f0000000104fffff13b54c007110009f30501000b00024000000000050000", 0x1f) 03:34:57 executing program 4: getrusage(0x1, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000004c0)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1}, 0xc) openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005400)={{{@in=@multicast2, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) getpgid(0x0) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getgroups(0x0, &(0x7f0000000e00)) getpid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000015c0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001980)) getegid() pipe2(&(0x7f0000002100), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f00)) getgid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000044c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000004480)='/dev/keychord\x00'}, 0x30) getgroups(0x0, &(0x7f0000000dc0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgrp(0x0) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004dc0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000004d80)='nbd\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000004e40)) getpid() 03:34:57 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x101080, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@broadcast, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) geteuid() getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b40), &(0x7f0000002b80)=0xc) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000005c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) geteuid() lstat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000006700)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d80)={{{@in=@dev, @in=@multicast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f0000002e80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f40)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getpgrp(0x0) geteuid() lstat(&(0x7f00000030c0)='./file0\x00', &(0x7f0000003100)) gettid() getresuid(&(0x7f0000003180), &(0x7f00000031c0), &(0x7f0000003200)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000003580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003600)) stat(&(0x7f0000003680)='./file0\x00', &(0x7f00000036c0)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003740)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000003840)=0xe8) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000038c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000003c40)=0xe8) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d80)={{{@in6, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000003e80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), &(0x7f0000003f00)=0xc) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000004040)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffffffffffffffe0) getresgid(&(0x7f0000004200), &(0x7f0000004240), &(0x7f0000004280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000042c0), &(0x7f0000004300)=0xc) geteuid() 03:34:57 executing program 5: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f00000001c0)="1f0000000104fffff13b54c007110009f30501000b00024000000000050000", 0x1f) [ 3309.621869] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 03:34:58 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe1}]}) pipe(&(0x7f0000000100)) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000240)=""/170) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="428055a03b6969ef69dc00d9fbf3440f6f50e2f046f713393905bd060f38211a40a564a70f157a9e400f01efe5e57571f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd28410f0f8084170000ae") [ 3309.682332] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 03:34:58 executing program 5: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getpid() getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600), 0x0) getuid() fstat(0xffffffffffffffff, &(0x7f00000006c0)) getresuid(&(0x7f00000004c0), &(0x7f0000000740), &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@mcast1, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@dev, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in6}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000c80)=0xe8) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000d80)) getegid() getgid() getresgid(&(0x7f0000000e80), &(0x7f0000000ec0), &(0x7f0000000f00)) lstat(&(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000f80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000340)='system.posix_acl_access\x00', &(0x7f0000001000), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000001100)='./file0/file0/file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:00 executing program 4: getrusage(0x1, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000004c0)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1}, 0xc) openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005400)={{{@in=@multicast2, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) getpgid(0x0) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getgroups(0x0, &(0x7f0000000e00)) getpid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000015c0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001980)) getegid() pipe2(&(0x7f0000002100), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f00)) getgid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000044c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000004480)='/dev/keychord\x00'}, 0x30) getgroups(0x0, &(0x7f0000000dc0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgrp(0x0) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004dc0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000004d80)='nbd\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000004e40)) getpid() 03:35:00 executing program 2: keyctl$set_reqkey_keyring(0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0360f1ad78e9fc421f97087b90000000f7fb3dffbc9") accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000240), 0x0) socket$inet(0x2, 0x0, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/context\x00', 0x2, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) epoll_create(0x0) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in=@dev, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getgid() getgid() getgid() fstat(0xffffffffffffffff, &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) getresgid(&(0x7f0000001180), &(0x7f00000011c0), &(0x7f0000001200)) stat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)) fstat(0xffffffffffffffff, &(0x7f0000001900)) getegid() getresgid(&(0x7f0000002f00), &(0x7f0000002f40), &(0x7f0000002f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000003000)=0xc) lstat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000031c0), 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000cc0)) socket$inet6_udp(0xa, 0x2, 0x0) signalfd4(0xffffffffffffff9c, &(0x7f0000000400), 0x8, 0x0) 03:35:00 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)) rt_sigtimedwait(&(0x7f00000003c0), 0x0, &(0x7f0000000500), 0x82) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000001c0)}) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) futex(&(0x7f0000000340), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0fd3d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:00 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x101080, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@broadcast, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) geteuid() getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b40), &(0x7f0000002b80)=0xc) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000005c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) geteuid() lstat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000006700)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d80)={{{@in=@dev, @in=@multicast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f0000002e80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f40)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getpgrp(0x0) geteuid() lstat(&(0x7f00000030c0)='./file0\x00', &(0x7f0000003100)) gettid() getresuid(&(0x7f0000003180), &(0x7f00000031c0), &(0x7f0000003200)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000003580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003600)) stat(&(0x7f0000003680)='./file0\x00', &(0x7f00000036c0)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003740)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000003840)=0xe8) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000038c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000003c40)=0xe8) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d80)={{{@in6, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000003e80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), &(0x7f0000003f00)=0xc) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000004040)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffffffffffffffe0) getresgid(&(0x7f0000004200), &(0x7f0000004240), &(0x7f0000004280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000042c0), &(0x7f0000004300)=0xc) geteuid() 03:35:00 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6, @in6}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) add_key(&(0x7f00000002c0)='ceph\x00', &(0x7f0000000340), &(0x7f0000000380), 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f0000000140), &(0x7f00000001c0), 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:35:00 executing program 3: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffc) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f3821c2437373a7c4a2f930b80e70714b400f01ef71c58ef59cc48ef5f5ec1a1a01460f01ee31a3b786e6989f") 03:35:00 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000140)) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 03:35:00 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000140)) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 03:35:00 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000140)) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 03:35:00 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, &(0x7f0000000140)) sendto$inet(r0, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 03:35:00 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000340)='illinois\x00', 0x9) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000400)) syz_execute_func(&(0x7f0000000380)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d0629002ef3ad0f993d233d234142d85d0967f20f7d44a200660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f00000001c0)=@generic) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @local}, &(0x7f0000000300)=0xc) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) fstat(0xffffffffffffffff, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getgid() getgroups(0x0, &(0x7f0000000a40)) getgid() setgroups(0x0, &(0x7f0000000a80)) getpid() ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'ah\x00'}, &(0x7f0000000180)=0x1e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000004c0), 0x8) getgroups(0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080), &(0x7f0000000200)='\x00', 0x0) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xffffffffffffffff) keyctl$negate(0xd, 0x0, 0x0, 0x0) request_key(&(0x7f0000000500)='rxrpc_s\x00', &(0x7f0000000540), &(0x7f0000000580)='illinois\x00', 0xffffffffffffffff) getgroups(0x0, &(0x7f0000000080)) keyctl$set_reqkey_keyring(0xe, 0x0) 03:35:00 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000abd000)={@link_local, @random="e2701bb60689", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x3000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, &(0x7f0000000040)) 03:35:00 executing program 0: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x101080, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@broadcast, @in6}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000480)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000029c0)) geteuid() getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b40), &(0x7f0000002b80)=0xc) stat(&(0x7f0000000340)='./file1/file0\x00', &(0x7f00000005c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) geteuid() lstat(&(0x7f0000002cc0)='./file0\x00', &(0x7f0000006700)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d80)={{{@in=@dev, @in=@multicast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@remote}}, &(0x7f0000002e80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f40)) fstat(0xffffffffffffffff, &(0x7f0000002f80)) getpgrp(0x0) geteuid() lstat(&(0x7f00000030c0)='./file0\x00', &(0x7f0000003100)) gettid() getresuid(&(0x7f0000003180), &(0x7f00000031c0), &(0x7f0000003200)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000003580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000035c0)) fstat(0xffffffffffffffff, &(0x7f0000003600)) stat(&(0x7f0000003680)='./file0\x00', &(0x7f00000036c0)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003740)={{{@in6=@dev, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@dev}}, &(0x7f0000003840)=0xe8) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000038c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003b40)={{{@in=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000003c40)=0xe8) lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003d80)={{{@in6, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000003e80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003ec0), &(0x7f0000003f00)=0xc) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f40)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000004040)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6, @in6=@ipv4={[], [], @loopback}}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xffffffffffffffe0) getresgid(&(0x7f0000004200), &(0x7f0000004240), &(0x7f0000004280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000042c0), &(0x7f0000004300)=0xc) geteuid() 03:35:02 executing program 0: clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x10) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000300)='./file1\x00', &(0x7f0000000540)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0xffffffffffffff6b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:02 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)) rt_sigtimedwait(&(0x7f00000003c0), 0x0, &(0x7f0000000500), 0x82) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000001c0)}) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) futex(&(0x7f0000000340), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0fd3d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:02 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000abd000)={@link_local, @random="e2701bb60689", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x3000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, &(0x7f0000000040)) 03:35:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x80045438, 0x707001) 03:35:02 executing program 3: utime(&(0x7f0000000580)='./file1\x00', &(0x7f0000000500)) seccomp(0x0, 0x0, &(0x7f0000000100)) eventfd(0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@multicast1, @multicast2, @rand_addr}, &(0x7f0000000580)=0xc) clock_gettime(0x0, &(0x7f0000000280)) socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[]}}, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440), 0x12) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f00000003c0)) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@multicast1, @local}, &(0x7f0000000740)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0, &(0x7f00000015c0)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001600)={@mcast1}, &(0x7f0000001640)=0x14) 03:35:02 executing program 2: prctl$intptr(0x1b, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000280), &(0x7f0000000300), 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) syz_execute_func(&(0x7f0000000500)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") epoll_create(0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/enforce\x00', 0x0, 0x0) 03:35:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x80045438, 0x707001) 03:35:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x80045438, 0x707001) 03:35:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x80045438, 0x707001) 03:35:02 executing program 5: futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240), 0x0) mount(&(0x7f0000000600)=ANY=[], &(0x7f0000000580)='./file0\x00', &(0x7f0000000440)='reiserfs\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) open(&(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@multicast1, @in=@loopback}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@remote}, &(0x7f0000000480)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c80)={0x0, @multicast1, @broadcast}, &(0x7f0000000cc0)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000d00), &(0x7f0000000d40)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ec0)={'ip_vti0\x00'}) clock_gettime(0x0, &(0x7f00000072c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000007080), 0x0, 0x0, &(0x7f0000007300)) getpeername(0xffffffffffffffff, &(0x7f0000007340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000073c0)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000007400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007440)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007480)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000007580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000075c0)={{{@in6=@local, @in6}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f00000076c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:02 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000abd000)={@link_local, @random="e2701bb60689", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x3000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, &(0x7f0000000040)) 03:35:02 executing program 0: sched_yield() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 03:35:02 executing program 5: munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000001440)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @remote}}, 0x5c) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000340)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/mls\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000d40)) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0x9) close(0xffffffffffffffff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x0, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000006c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000004c0), 0xc, &(0x7f0000000640)={&(0x7f0000000540)=ANY=[]}}, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8953, &(0x7f0000000140)={{0x2, 0x0, @remote}, {0x0, @remote}}) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000002c0)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getpeername$unix(0xffffffffffffffff, &(0x7f0000000440)=@abs, &(0x7f0000000240)=0x6e) 03:35:03 executing program 2: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) clock_gettime(0x0, &(0x7f00000003c0)) getresuid(&(0x7f0000000440), &(0x7f0000000180), &(0x7f0000000580)) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0xd4}, 0x28, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000d40), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d80)='cpuset.effective_mems\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) keyctl$set_reqkey_keyring(0xb, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03b6969ef69dc00d9fbfb69203737c339bd060f38211a40a564a70f157a9e400f01ef8d81495d3f417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227b92c4c3916c9a7cf5ce5c79") 03:35:04 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)) rt_sigtimedwait(&(0x7f00000003c0), 0x0, &(0x7f0000000500), 0x82) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000001c0)}) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) futex(&(0x7f0000000340), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0fd3d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:04 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x8) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000abd000)={@link_local, @random="e2701bb60689", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @rand_addr}, @icmp=@parameter_prob={0x21, 0x0, 0x0, 0x0, 0x0, 0x3000, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}}}}}}, &(0x7f0000000040)) 03:35:04 executing program 0: set_tid_address(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000000c0)) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0), 0xc) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, &(0x7f0000000000)) sigaltstack(&(0x7f0000000000/0x4000)=nil, &(0x7f0000000040)) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/178, 0xb2, 0x0) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='cgroupkeyring[\\\x00', 0xffffffffffffff9c}, 0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000980)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000004940), 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004b40)={@empty, @rand_addr}, &(0x7f0000004b80)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000b780), 0x0, 0x0, &(0x7f000000b880)={0x77359400}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000b9c0)={@remote}, &(0x7f000000ba00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000ba40)={{{@in=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f000000bb40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bb80)={{{@in6=@mcast2, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f000000bc80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000bcc0)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f000000d1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000d200)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000d880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000d8c0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f000000d900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000d940)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000013a80)={0x0, @multicast1}, &(0x7f0000013ac0)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000015040)={&(0x7f0000013b00)=@hci, 0x80, &(0x7f0000013fc0), 0x0, &(0x7f0000014040)=""/4096, 0x1000}, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000015140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000015180)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000151c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000015200)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000015240)={{{@in=@broadcast, @in6}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000015340)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000015440)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000015480), &(0x7f00000154c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000015500)={@multicast2, @multicast1}, &(0x7f0000015540)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000015580), &(0x7f00000155c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000015600)={'ip6gre0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000015680)=0x26d) 03:35:04 executing program 3: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:04 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) getpgrp(0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0xc06855c8, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap$binder(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000180)) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) llistxattr(&(0x7f0000000680)='./file0\x00', &(0x7f0000000780)=""/150, 0x96) clock_gettime(0x0, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000440)='syz0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000300)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000740)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgid() getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) 03:35:04 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000004c0), 0xffffffffffffffea) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) prctl$getname(0x10, &(0x7f0000000200)=""/103) epoll_create(0x0) getpgrp(0x0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000480)={0x0, @aes128, 0x0, "b6fdbbe1b12dfcb8"}) getpgrp(0x0) 03:35:04 executing program 5: prctl$void(0x21) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000140)) pipe2(&(0x7f0000000200), 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000080), 0x4) 03:35:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0xc06855c8, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap$binder(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000180)) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) llistxattr(&(0x7f0000000680)='./file0\x00', &(0x7f0000000780)=""/150, 0x96) clock_gettime(0x0, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000440)='syz0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000300)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000740)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgid() getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) 03:35:05 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000140), &(0x7f0000000180), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0xffffffffffffffd7) 03:35:05 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000bc0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000b80)='/dev/ppp\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e80)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) getgroups(0x0, &(0x7f00000010c0)) gettid() getgroups(0x0, &(0x7f00000001c0)) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000440)) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0/../file0\x00', &(0x7f0000000900)) stat(&(0x7f0000000600)='./file0/../file0\x00', &(0x7f0000000980)) getegid() getgid() getegid() getgroups(0x0, &(0x7f0000000a00)) stat(&(0x7f0000001100)='./file0/../file0\x00', &(0x7f0000001140)) lstat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f0000000680)=@proc, 0xc, &(0x7f0000001040), 0x0, &(0x7f0000001280)}, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) fstat(0xffffffffffffffff, &(0x7f0000001840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@multicast2, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f00000005c0)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:06 executing program 2: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) clock_gettime(0x0, &(0x7f00000003c0)) getresuid(&(0x7f0000000440), &(0x7f0000000180), &(0x7f0000000580)) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0xd4}, 0x28, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000d40), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d80)='cpuset.effective_mems\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) keyctl$set_reqkey_keyring(0xb, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03b6969ef69dc00d9fbfb69203737c339bd060f38211a40a564a70f157a9e400f01ef8d81495d3f417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227b92c4c3916c9a7cf5ce5c79") 03:35:06 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000600)) rt_sigtimedwait(&(0x7f00000003c0), 0x0, &(0x7f0000000500), 0x82) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000001c0)}) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000340), 0x0, 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000200)) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000005c0)) futex(&(0x7f0000000340), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0fd3d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0xc06855c8, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap$binder(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000180)) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) llistxattr(&(0x7f0000000680)='./file0\x00', &(0x7f0000000780)=""/150, 0x96) clock_gettime(0x0, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000440)='syz0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000300)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000740)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgid() getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) 03:35:06 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffb) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) inotify_init() clock_gettime(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000340)) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000000c0)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410f33eefafa2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:06 executing program 5: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f00000002c0)) creat(&(0x7f0000000040)='./file0\x00', 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept(0xffffffffffffff9c, 0x0, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xffffffffffffff93) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:35:06 executing program 3: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000006540)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0xc06855c8, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) mmap$binder(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000180)) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) llistxattr(&(0x7f0000000680)='./file0\x00', &(0x7f0000000780)=""/150, 0x96) clock_gettime(0x0, &(0x7f0000000080)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000440)='syz0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000300)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000740)) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000540), 0x0) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getgid() getgid() lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) 03:35:07 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x100000000141042, 0x0) unlink(&(0x7f0000000000)='./bus\x00') ioctl(r0, 0x6611, &(0x7f0000000180)) 03:35:07 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f0000000440)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000400)}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000c40), 0x0, 0x0, &(0x7f0000001bc0)={0x0, 0x989680}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000240)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000040)={'ip6_vti0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:07 executing program 0: lookup_dcookie(0x0, &(0x7f0000000040)=""/3, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540)) syz_execute_func(&(0x7f0000000500)="42805da0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:07 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) setgid(r1) 03:35:08 executing program 0: munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) request_key(&(0x7f00000008c0)='big_key\x00', &(0x7f0000000900), &(0x7f0000000940)='%keyringproc\\\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f0000000880), &(0x7f0000000840)="7465defb5e0c74bfa20c26bebfd9e0938fcc00", 0x0) add_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, &(0x7f0000000440)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@mcast1, @remote, @dev}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000680)={@dev}, &(0x7f0000000080)=0xffffffffffffff2a) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000a00)={@dev}, &(0x7f0000000640)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@local, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000b80)=0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in=@loopback, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000d00)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000000f80), 0x0, 0x0, &(0x7f0000000fc0)={0x77359400}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001000)={@empty, @local}, &(0x7f0000001040)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001080)={{{@in6=@remote, @in6=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000011c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@local, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001300)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001380)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) 03:35:08 executing program 2: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) clock_gettime(0x0, &(0x7f00000003c0)) getresuid(&(0x7f0000000440), &(0x7f0000000180), &(0x7f0000000580)) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0xd4}, 0x28, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000d40), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d80)='cpuset.effective_mems\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) keyctl$set_reqkey_keyring(0xb, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03b6969ef69dc00d9fbfb69203737c339bd060f38211a40a564a70f157a9e400f01ef8d81495d3f417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227b92c4c3916c9a7cf5ce5c79") 03:35:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x82102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) writev(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)="0f", 0x1}], 0x1) 03:35:08 executing program 4: fcntl$getown(0xffffffffffffff9c, 0x9) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f00000003c0)={0x7}, 0x7) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000240)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000340)) fcntl$getown(0xffffffffffffff9c, 0x9) getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/178) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$inet(0x2, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) getgid() lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000005c0)) getgid() getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000008c0)=0xe8) 03:35:08 executing program 5: ustat(0x6, &(0x7f0000000140)) socket$inet_tcp(0x2, 0x1, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@in, &(0x7f00000000c0)=0x80, 0x0) getrusage(0x0, &(0x7f0000000440)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000500)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_gettime(0x0, &(0x7f0000000080)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000003c0)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000d30000), 0x4) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:08 executing program 1: add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300), &(0x7f0000000500)=' ', 0x1, 0xfffffffffffffffb) request_key(&(0x7f00000007c0)='cifs.spnego\x00', &(0x7f0000000800), &(0x7f0000000840)='{*\x00', 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000600), 0x0, 0x0) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)=0x26a, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='\x00') 03:35:08 executing program 3: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000006540)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x82102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) writev(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)="0f", 0x1}], 0x1) 03:35:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x82102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) writev(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)="0f", 0x1}], 0x1) 03:35:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x82102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) writev(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)="0f", 0x1}], 0x1) 03:35:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x82102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) writev(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)="0f", 0x1}], 0x1) 03:35:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x82102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) writev(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)="0f", 0x1}], 0x1) 03:35:10 executing program 5: getrusage(0x0, &(0x7f0000000700)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x2f7, &(0x7f0000000240)}) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) fstat(0xffffffffffffffff, &(0x7f0000001100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000fc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000010c0)=0xe8) getgroups(0x0, &(0x7f0000000240)) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001400)=0xe8) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000007400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b80), &(0x7f0000001bc0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001c00)={{{@in=@loopback, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001d00)=0xe8) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e00)) geteuid() getgid() getpid() stat(&(0x7f0000007240)='./file0\x00', &(0x7f00000071c0)) getresgid(&(0x7f0000003540), &(0x7f0000003580), &(0x7f00000035c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003600), &(0x7f0000003640)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003680)) getpgid(0x0) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000004c00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d00)) stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) stat(&(0x7f0000004e00)='./file0\x00', &(0x7f0000004e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005040), &(0x7f0000005080)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005380)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006c80)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000006d80)=0xe8) getegid() 03:35:10 executing program 2: syz_open_procfs$namespace(0x0, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) clock_gettime(0x0, &(0x7f00000003c0)) getresuid(&(0x7f0000000440), &(0x7f0000000180), &(0x7f0000000580)) lsetxattr$trusted_overlay_nlink(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'L+', 0xd4}, 0x28, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/null\x00', 0x0, 0x0) pipe2(&(0x7f0000000d40), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000d80)='cpuset.effective_mems\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) keyctl$set_reqkey_keyring(0xb, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a03b6969ef69dc00d9fbfb69203737c339bd060f38211a40a564a70f157a9e400f01ef8d81495d3f417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227b92c4c3916c9a7cf5ce5c79") 03:35:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='loginuid\x00') perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x82102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) writev(r0, &(0x7f00000024c0)=[{&(0x7f00000000c0)="0f", 0x1}], 0x1) 03:35:10 executing program 0: prctl$getname(0x10, &(0x7f0000000140)=""/93) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000002c0)) ftruncate(0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a02ec402ed07faf4e37d0fe1fb6920375137c339392a5a8e38211a1aa564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") fcntl$getflags(0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000340)='ppp1\\\x00', 0x0) 03:35:10 executing program 3: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000006540)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:11 executing program 1: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000008c0)=0xc) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a40)) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0), 0x0) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000001bc0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000001d00)='/selinux/avc/hash_stats\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@remote, @in=@multicast2}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) signalfd(0xffffffffffffff9c, &(0x7f0000001f00), 0x8) accept$packet(0xffffffffffffffff, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f80)=0x14) openat(0xffffffffffffffff, &(0x7f0000001fc0)='./file0\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000002000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002040)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getgroups(0x0, &(0x7f0000002140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$urandom(0xffffffffffffff9c, &(0x7f0000002180)='/dev/urandom\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000021c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000002200)='/selinux/access\x00', 0x2, 0x0) getpid() getresuid(&(0x7f0000002440), &(0x7f0000002480), &(0x7f00000024c0)) fstat(0xffffffffffffff9c, &(0x7f0000002500)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002580)='cgroup.type\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000025c0)=@raw, &(0x7f0000002640)='syzkaller\x00', 0x0, 0x5f, &(0x7f0000002680)=""/95}, 0x48) syz_open_dev$sndtimer(&(0x7f0000002780)='/dev/snd/timer\x00', 0x0, 0x0) epoll_create(0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000027c0), 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ion\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002880)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002980)=0xe8) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpid() getresuid(&(0x7f0000002a80), &(0x7f0000002ac0), &(0x7f0000002b00)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/198, 0xc6, 0x0, &(0x7f0000000900)=@abs, 0x6e) 03:35:11 executing program 4: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)) pipe(&(0x7f0000000240)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) sync() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getgroups(0x0, &(0x7f00000006c0)) getresgid(&(0x7f0000000700), &(0x7f00000007c0), &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000840)) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/116, 0x74) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:35:11 executing program 0: io_destroy(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) creat(&(0x7f0000000480)='./file0/file0\x00', 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000500)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:11 executing program 5: clock_nanosleep(0x1, 0x0, &(0x7f0000000080), &(0x7f0000000140)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000540)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f0000000700), &(0x7f0000000840), &(0x7f0000000880)) getgroups(0x0, &(0x7f00000008c0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000980)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000b80)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 03:35:11 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000580)=0xc) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000940)=0xc) getpgrp(0x0) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000700)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641c9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:35:11 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)) 03:35:11 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/rtc\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) chroot(&(0x7f0000000040)='./file0\x00') seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) recvmmsg(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0, &(0x7f0000000840)) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0470fef69dcd9f3c483710d69ff66f91c870f87ba1ac4c482fd25208fe9689b4700420f1b8215000000b6c8e510e5f5d7765d5d932ebc2ebc0d64ac1a4c5d9f7ffd") init_module(&(0x7f0000000080)='cpusetvmnet0self+:(\x00', 0x14, &(0x7f00000000c0)='&vboxnet1em0keyringGPL}self$md5sumlovboxnet1\x00') 03:35:12 executing program 5: clock_nanosleep(0x1, 0x0, &(0x7f0000000080), &(0x7f0000000140)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000540)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f0000000700), &(0x7f0000000840), &(0x7f0000000880)) getgroups(0x0, &(0x7f00000008c0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000980)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000b80)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 03:35:12 executing program 4: futex(&(0x7f0000000280), 0x3, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000980), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000008c0), &(0x7f0000000900)=""/38, 0x26, &(0x7f0000000a40)={&(0x7f0000000940)={'sha256-generic\x00'}, &(0x7f0000000980), 0xe8}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) socket$nl_netfilter(0x10, 0x3, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$nl_netfilter(0x10, 0x3, 0xc) clock_settime(0x0, &(0x7f00000004c0)={0x0, 0x989680}) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000500)=""/158, &(0x7f0000000140)=0x9e) 03:35:12 executing program 0: setpriority(0x0, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) memfd_create(&(0x7f0000001bc0)="77a5c5e9189cee79cd93a7df6d570c7647098b733d", 0x0) memfd_create(&(0x7f0000000400)='vlan0\x00', 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000003c0)={'bridge_slave_0\x00'}) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) keyctl$set_reqkey_keyring(0x7, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) memfd_create(&(0x7f0000000300)='cpuset@\x00', 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f00000002c0)) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x18}, 0x18) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000180)=0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/96, 0x60}, 0x0) getpid() wait4(0x0, &(0x7f0000000500), 0x0, &(0x7f0000000540)) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000002c0)) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') syz_execute_func(&(0x7f0000000040)="42805da06d0fef69dc0f01eeaf6c66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d318eb7c44379dfb9d6adbe90dfe298a89ff77f") 03:35:12 executing program 3: getrusage(0x1, &(0x7f0000000600)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000009c0)=0xe8) lstat(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000006540)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:12 executing program 2: getrandom(&(0x7f00000002c0)=""/148, 0x94, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getpeername(0xffffffffffffff9c, &(0x7f0000000800)=@hci, &(0x7f0000000880)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000008c0), &(0x7f0000000900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@multicast1, @multicast1}, &(0x7f0000000980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @rand_addr, @local}, &(0x7f0000000040)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000700)='./file1\x00', &(0x7f0000000c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@rand_addr, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001080)) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) geteuid() getgroups(0x0, &(0x7f0000001240)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getegid() fstat(0xffffffffffffffff, &(0x7f0000001300)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000001380)=ANY=[], 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000d80)=@xdp, &(0x7f0000000e00)=0x80, 0x0) getpgrp(0x0) getpgid(0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000780), 0xc, &(0x7f00000011c0)={&(0x7f0000001440)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:13 executing program 1: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000008c0)=0xc) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a40)) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0), 0x0) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000001bc0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000001d00)='/selinux/avc/hash_stats\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@remote, @in=@multicast2}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) signalfd(0xffffffffffffff9c, &(0x7f0000001f00), 0x8) accept$packet(0xffffffffffffffff, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f80)=0x14) openat(0xffffffffffffffff, &(0x7f0000001fc0)='./file0\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000002000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002040)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getgroups(0x0, &(0x7f0000002140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$urandom(0xffffffffffffff9c, &(0x7f0000002180)='/dev/urandom\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000021c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000002200)='/selinux/access\x00', 0x2, 0x0) getpid() getresuid(&(0x7f0000002440), &(0x7f0000002480), &(0x7f00000024c0)) fstat(0xffffffffffffff9c, &(0x7f0000002500)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002580)='cgroup.type\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000025c0)=@raw, &(0x7f0000002640)='syzkaller\x00', 0x0, 0x5f, &(0x7f0000002680)=""/95}, 0x48) syz_open_dev$sndtimer(&(0x7f0000002780)='/dev/snd/timer\x00', 0x0, 0x0) epoll_create(0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000027c0), 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ion\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002880)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002980)=0xe8) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpid() getresuid(&(0x7f0000002a80), &(0x7f0000002ac0), &(0x7f0000002b00)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/198, 0xc6, 0x0, &(0x7f0000000900)=@abs, 0x6e) 03:35:13 executing program 5: clock_nanosleep(0x1, 0x0, &(0x7f0000000080), &(0x7f0000000140)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000540)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f0000000700), &(0x7f0000000840), &(0x7f0000000880)) getgroups(0x0, &(0x7f00000008c0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000980)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000b80)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 03:35:13 executing program 4: poll(&(0x7f0000000140), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f000000a0c0)="428055a0726969ef69dc00d9c48179f7dbbfbf203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) stat(&(0x7f0000004600)='./file0\x00', &(0x7f0000004640)) getresgid(&(0x7f00000046c0), &(0x7f0000004700), &(0x7f0000004740)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004780)) lstat(&(0x7f00000047c0)='./file0\x00', &(0x7f0000004800)) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004880)) getuid() fstat(0xffffffffffffffff, &(0x7f00000048c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004b80)) getresuid(&(0x7f0000004bc0), &(0x7f0000004c00), &(0x7f0000004c40)) lstat(&(0x7f0000004c80)='./file0\x00', &(0x7f0000004cc0)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) getgroups(0x0, &(0x7f0000005000)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in=@local, @in6=@loopback}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005180)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() stat(&(0x7f0000005680)='./file0\x00', &(0x7f00000056c0)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005740)={{{@in=@multicast1, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000005840)=0xe8) getgroups(0x0, &(0x7f0000005880)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005900)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f00000058c0)='md5sumvboxnet1\x00'}, 0x30) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005940), &(0x7f0000005980)=0xc) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000008bc0)) getgroups(0x0, &(0x7f0000008c40)) dup(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000009100)) lstat(&(0x7f0000009140)='./file0\x00', &(0x7f0000009180)) getresgid(&(0x7f0000009200), &(0x7f0000009240), &(0x7f0000009280)) getpgrp(0xffffffffffffffff) getuid() fstat(0xffffffffffffffff, &(0x7f00000092c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000009340)) lstat(&(0x7f0000009380)='./file0\x00', &(0x7f00000093c0)) stat(&(0x7f0000009440)='./file0\x00', &(0x7f0000009480)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000009880)) 03:35:13 executing program 0: listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x4) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:13 executing program 5: clock_nanosleep(0x1, 0x0, &(0x7f0000000080), &(0x7f0000000140)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000540)) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@multicast1}}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000580)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f00000005c0)) fstat(0xffffffffffffffff, &(0x7f0000000640)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f00000007c0)) getresgid(&(0x7f0000000700), &(0x7f0000000840), &(0x7f0000000880)) getgroups(0x0, &(0x7f00000008c0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000980)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000b80)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") 03:35:14 executing program 5: futex(&(0x7f00000000c0), 0xc, 0x0, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000800)=""/216}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000240)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000004c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000640)={@loopback, @broadcast}, &(0x7f0000000680)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001040)={{{@in=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000001140)=0xe8) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001280)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000013c0)={@mcast2}, &(0x7f0000001400)=0x14) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000440)) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001440), &(0x7f0000001480)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000014c0)={'team_slave_0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001700)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f00000017c0)={@loopback, @local}, &(0x7f0000001800)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001840)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001940)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001980)={@loopback, @rand_addr}, &(0x7f00000019c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001b00)=0x14, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/23, 0x2ea5188bf00276d7, 0x0, 0x0, 0xfffffffffffffd5a) getpgrp(0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x23, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 'team\x00'}}, 0x23) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001b40)={@remote}, &(0x7f0000001b80)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001c00)={{{@in=@multicast1, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001d00)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:35:14 executing program 4: ioprio_get$pid(0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000009c0)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000840), &(0x7f0000000800)=0x4) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socket$nl_generic(0x10, 0x3, 0x10) 03:35:14 executing program 0: mlockall(0x80000000000004) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast1, @in6}}, {{@in=@broadcast}}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@remote}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000007c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000840)={@broadcast, @multicast2}, &(0x7f0000000880)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000008c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000900)={@remote}, &(0x7f0000000940)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@remote, @remote}, &(0x7f0000000a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@multicast1, @in6=@dev}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c00)={@local, @dev}, &(0x7f0000000dc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000e00)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e40)={{{@in6=@mcast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000f40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000011c0)={@multicast1, @local}, &(0x7f0000001200)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000012c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001300)={0x0, @multicast2, @dev}, &(0x7f0000001340)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000001380), &(0x7f00000013c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0xfffffffffffffedb, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'ipddp0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001840)={{{@in, @in6=@loopback}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001940)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in6=@mcast2, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001c00)={@broadcast, @loopback}, &(0x7f0000001c40)=0xc) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001c80)={@local}, &(0x7f0000001cc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in=@local, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000001e00)=0xe8) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:14 executing program 5: epoll_create(0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) inotify_init() creat(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) getrlimit(0x0, &(0x7f0000000300)) setpriority(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") sendto$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 03:35:15 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:16 executing program 2: getrandom(&(0x7f00000002c0)=""/148, 0x94, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getpeername(0xffffffffffffff9c, &(0x7f0000000800)=@hci, &(0x7f0000000880)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000008c0), &(0x7f0000000900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@multicast1, @multicast1}, &(0x7f0000000980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @rand_addr, @local}, &(0x7f0000000040)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000700)='./file1\x00', &(0x7f0000000c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@rand_addr, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001080)) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) geteuid() getgroups(0x0, &(0x7f0000001240)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getegid() fstat(0xffffffffffffffff, &(0x7f0000001300)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000001380)=ANY=[], 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000d80)=@xdp, &(0x7f0000000e00)=0x80, 0x0) getpgrp(0x0) getpgid(0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000780), 0xc, &(0x7f00000011c0)={&(0x7f0000001440)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:16 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffe) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000200)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") accept(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 03:35:16 executing program 1: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000008c0)=0xc) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a40)) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0), 0x0) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000001bc0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000001d00)='/selinux/avc/hash_stats\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@remote, @in=@multicast2}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) signalfd(0xffffffffffffff9c, &(0x7f0000001f00), 0x8) accept$packet(0xffffffffffffffff, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f80)=0x14) openat(0xffffffffffffffff, &(0x7f0000001fc0)='./file0\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000002000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002040)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getgroups(0x0, &(0x7f0000002140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$urandom(0xffffffffffffff9c, &(0x7f0000002180)='/dev/urandom\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000021c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000002200)='/selinux/access\x00', 0x2, 0x0) getpid() getresuid(&(0x7f0000002440), &(0x7f0000002480), &(0x7f00000024c0)) fstat(0xffffffffffffff9c, &(0x7f0000002500)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002580)='cgroup.type\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000025c0)=@raw, &(0x7f0000002640)='syzkaller\x00', 0x0, 0x5f, &(0x7f0000002680)=""/95}, 0x48) syz_open_dev$sndtimer(&(0x7f0000002780)='/dev/snd/timer\x00', 0x0, 0x0) epoll_create(0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000027c0), 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ion\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002880)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002980)=0xe8) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpid() getresuid(&(0x7f0000002a80), &(0x7f0000002ac0), &(0x7f0000002b00)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/198, 0xc6, 0x0, &(0x7f0000000900)=@abs, 0x6e) 03:35:16 executing program 5: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) 03:35:16 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:16 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) write$binfmt_elf32(r1, &(0x7f0000000280)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="b2eb48612be433e1051f5f406e6458964133f09c027aa7a6b34aa866e86688e3f470cc3c4472e94ae407f23f366c3b7aa9cfbdad4db810680e234cc6afb8e83da53c07000000cbcab2dfa7bc1b50d0"]], 0x8) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x12}) 03:35:16 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x260000, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:35:17 executing program 5: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) 03:35:17 executing program 5: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) 03:35:17 executing program 5: io_setup(0x20, &(0x7f000086a000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x31, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x0, 0x1, &(0x7f0000e72fe0)=[{}], &(0x7f00009ca000)) 03:35:17 executing program 5: add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)="92", 0x1, 0xfffffffffffffffb) clock_gettime(0x0, &(0x7f0000000540)) select(0x40, &(0x7f0000000380), &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000580)) keyctl$describe(0x6, 0x0, &(0x7f0000000400)=""/185, 0xb9) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001d80)={@multicast2, @remote}, &(0x7f0000001dc0)=0xc) sendto$packet(0xffffffffffffffff, &(0x7f0000000cc0), 0x0, 0x0, &(0x7f0000001e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="06b75e645aeb"}, 0x14) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000005c0), 0xc, &(0x7f0000000780)={&(0x7f0000000640)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@local, @in6=@dev}}, {{}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) 03:35:17 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:17 executing program 2: getrandom(&(0x7f00000002c0)=""/148, 0x94, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getpeername(0xffffffffffffff9c, &(0x7f0000000800)=@hci, &(0x7f0000000880)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000008c0), &(0x7f0000000900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@multicast1, @multicast1}, &(0x7f0000000980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @rand_addr, @local}, &(0x7f0000000040)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000700)='./file1\x00', &(0x7f0000000c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@rand_addr, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001080)) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) geteuid() getgroups(0x0, &(0x7f0000001240)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getegid() fstat(0xffffffffffffffff, &(0x7f0000001300)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000001380)=ANY=[], 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000d80)=@xdp, &(0x7f0000000e00)=0x80, 0x0) getpgrp(0x0) getpgid(0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000780), 0xc, &(0x7f00000011c0)={&(0x7f0000001440)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:17 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f00000009c0)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) socket$nl_generic(0x10, 0x3, 0x10) getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000880)={{{@in=@multicast2, @in6}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000980)=0xe8) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) clock_adjtime(0x0, &(0x7f0000000180)) getpgid(0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000a00)) stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000000600)) fcntl$getown(0xffffffffffffffff, 0x9) socket(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) stat(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001ac0)) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") pipe2(&(0x7f0000000040), 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000000580)) getgroups(0x2c8, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000840)) 03:35:18 executing program 1: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000008c0)=0xc) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a40)) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0), 0x0) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000001bc0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000001d00)='/selinux/avc/hash_stats\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@remote, @in=@multicast2}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) signalfd(0xffffffffffffff9c, &(0x7f0000001f00), 0x8) accept$packet(0xffffffffffffffff, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f80)=0x14) openat(0xffffffffffffffff, &(0x7f0000001fc0)='./file0\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000002000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002040)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getgroups(0x0, &(0x7f0000002140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$urandom(0xffffffffffffff9c, &(0x7f0000002180)='/dev/urandom\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000021c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000002200)='/selinux/access\x00', 0x2, 0x0) getpid() getresuid(&(0x7f0000002440), &(0x7f0000002480), &(0x7f00000024c0)) fstat(0xffffffffffffff9c, &(0x7f0000002500)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002580)='cgroup.type\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000025c0)=@raw, &(0x7f0000002640)='syzkaller\x00', 0x0, 0x5f, &(0x7f0000002680)=""/95}, 0x48) syz_open_dev$sndtimer(&(0x7f0000002780)='/dev/snd/timer\x00', 0x0, 0x0) epoll_create(0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000027c0), 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ion\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002880)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002980)=0xe8) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpid() getresuid(&(0x7f0000002a80), &(0x7f0000002ac0), &(0x7f0000002b00)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/198, 0xc6, 0x0, &(0x7f0000000900)=@abs, 0x6e) 03:35:18 executing program 3: mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') inotify_add_watch(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) mlock2(&(0x7f0000ff9000/0x6000)=nil, 0x6000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000400)) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000140)="428055a03b6969ef69dc00d9dc6f6ffbfb203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f3d") gettid() mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/57) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) msync(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000280), 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000680)) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fstat(0xffffffffffffffff, &(0x7f00000007c0)) getegid() clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000200)) 03:35:18 executing program 5: getgroups(0x0, &(0x7f0000000180)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) fstat(0xffffffffffffff9c, &(0x7f0000000280)) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f0000000680)) getgid() stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) setfsgid(0x0) ioprio_set$pid(0x0, 0x0, 0x0) setregid(0x0, 0x0) memfd_create(&(0x7f0000000140)='\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000840)={0x0, @broadcast, @local}, &(0x7f0000000880)=0xc) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000b00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b80)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000bc0), &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000c80)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000cc0)={0x0, @broadcast, @local}, &(0x7f0000000d00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000d40)={0x0, @multicast1}, &(0x7f0000000d80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ec0)={{{@in6=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001040), &(0x7f0000001080)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in6=@dev, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000014c0)={{{@in=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000015c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001640)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001680)) getpeername$packet(0xffffffffffffffff, &(0x7f00000017c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001800)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001880)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000018c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001900)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@loopback, @in6=@ipv4={[], [], @dev}}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001ec0)={{{@in=@rand_addr, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@broadcast}}}, &(0x7f0000001fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000002000)={@multicast2, @dev}, &(0x7f0000002040)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'syzkaller0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000020c0)={{{@in=@multicast2, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000021c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000002200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002240)=0x14, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000002ac0)={&(0x7f0000000400), 0xc, &(0x7f0000002a80)={&(0x7f0000002280)={0x14}, 0x14}}, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@rand_addr}}, {{@in6=@mcast2}}}, &(0x7f00000000c0)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) timerfd_create(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000300)='sysv\x00', 0x0, &(0x7f0000000340)='loselfppp0vmnet1\x00') socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) sched_setparam(0x0, &(0x7f0000000380)) getgroups(0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") 03:35:18 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:18 executing program 2: getrandom(&(0x7f00000002c0)=""/148, 0x94, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getpeername(0xffffffffffffff9c, &(0x7f0000000800)=@hci, &(0x7f0000000880)=0x80) accept$packet(0xffffffffffffffff, &(0x7f00000008c0), &(0x7f0000000900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@multicast1, @multicast1}, &(0x7f0000000980)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @rand_addr, @local}, &(0x7f0000000040)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) stat(&(0x7f0000000700)='./file1\x00', &(0x7f0000000c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@rand_addr, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000a00)=0xe8) lstat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001080)) lstat(&(0x7f0000001100)='./file0\x00', &(0x7f0000001140)) geteuid() getgroups(0x0, &(0x7f0000001240)) fstat(0xffffffffffffffff, &(0x7f0000001280)) getegid() fstat(0xffffffffffffffff, &(0x7f0000001300)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000001380)=ANY=[], 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b80)=0x14, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d40)=0x14, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000d80)=@xdp, &(0x7f0000000e00)=0x80, 0x0) getpgrp(0x0) getpgid(0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f0000000780), 0xc, &(0x7f00000011c0)={&(0x7f0000001440)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000680)) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:18 executing program 0: mknod(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/104, 0x4e394ef9d9c54cd6, 0x3) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000002c0)={'ipddp0\x00', @dev}) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000400)={0x86}, 0x7) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f00000001c0)=0x44) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000003c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)={0x0, 0x1c9c380}, 0x8) lgetxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=@known='trusted.overlay.origin\x00', &(0x7f00000004c0)=""/157, 0x9d) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000007c0)='tls\x00', 0x118) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) keyctl$set_reqkey_keyring(0xe, 0x0) sched_rr_get_interval(0x0, &(0x7f00000003c0)) io_setup(0x0, &(0x7f0000000640)) io_cancel(0x0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000700)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 03:35:19 executing program 4: getrlimit(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") creat(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$getown(0xffffffffffffffff, 0x9) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000300)) getuid() getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001780)=0xe8) getegid() getuid() getegid() getuid() lstat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) getgroups(0x0, &(0x7f0000001d40)) getgroups(0x0, &(0x7f00000021c0)) lstat(&(0x7f0000002200)='./file1\x00', &(0x7f0000002240)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000022c0)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000023c0)=0xe8) getresgid(&(0x7f0000002400), &(0x7f0000002440), &(0x7f0000002480)) stat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000002500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002580), &(0x7f00000025c0)=0xc) lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000002180)=0x191) fstat(0xffffffffffffffff, &(0x7f0000004040)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000040c0), &(0x7f0000004100)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004140)={{{@in, @in=@broadcast}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000004240)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004280), &(0x7f00000042c0)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004380), 0x0, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)}, 0x10) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000002100)=ANY=[], 0x0) seccomp(0x0, 0x0, &(0x7f0000000380)={0x0, &(0x7f0000000340)}) 03:35:19 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:19 executing program 0: socketpair$unix(0x1, 0x4000005, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000e00)=0xe8) getgroups(0x0, &(0x7f0000000e40)) getpgid(0x0) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getgid() getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f40)={{{@in=@broadcast, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getgroups(0x0, &(0x7f0000001080)) gettid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) gettid() lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) lstat(&(0x7f0000001f40)='./file0\x00', &(0x7f0000001f80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002000)='\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002080), &(0x7f00000020c0), &(0x7f0000002100)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) stat(&(0x7f00000021c0)='./file0\x00', &(0x7f0000002200)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002280)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002380)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003cc0)) fstat(0xffffffffffffffff, &(0x7f0000003d00)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003d80)='\x00'}, 0x30) getresuid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) fstat(0xffffffffffffffff, &(0x7f0000003ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000046c0)) stat(&(0x7f0000004700)='./file0\x00', &(0x7f0000004740)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004800)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000047c0)='trusted\x00'}, 0x30) lstat(&(0x7f0000004840)='./file0\x00', &(0x7f0000004880)) getresgid(&(0x7f0000004900), &(0x7f0000004940), &(0x7f0000004980)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca5000067470f371f7f") 03:35:19 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000240), 0xfffffffffffffea5) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:20 executing program 0: prctl$intptr(0x10800000001c, 0x2000000000000) syz_open_pts(0xffffffffffffff9c, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000a40)='ceph\x00', &(0x7f0000000a80), &(0x7f0000000ac0), 0x0, 0xfffffffffffffffd) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000980), 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000380)=""/253) recvmmsg(0xffffffffffffff9c, &(0x7f0000002e80), 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000b00)=0xfffffffffffffcf7) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f00000001c0)={0x0, @aes256, 0x0, "1fc5a73cf8c2c3ec"}) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000480)) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:35:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$keychord(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000500)='/dev/keychord\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000540)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000680)) times(&(0x7f0000000280)) openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000007c0)) accept(0xffffffffffffffff, &(0x7f0000000800)=@xdp, &(0x7f0000000880)=0xfffffffffffffe27) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') recvmmsg(0xffffffffffffff9c, &(0x7f0000005c40), 0x0, 0x0, &(0x7f0000005e00)={0x0, 0x989680}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000063c0)={{{@in=@multicast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000064c0)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) accept$packet(0xffffffffffffffff, &(0x7f0000006500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006540)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006740)={&(0x7f00000001c0), 0xc, &(0x7f0000006700)={&(0x7f00000002c0)=ANY=[]}}, 0x0) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000580)="42804da0c7a3a3ef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:21 executing program 4: r0 = timerfd_create(0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) r3 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r2, &(0x7f0000000040)=[{&(0x7f0000000080)=""/4096, 0x6a8}], 0x1) ioctl$int_in(r4, 0x5452, &(0x7f0000fc3000)=0x1) fcntl$setsig(r4, 0xa, 0x12) read(r5, &(0x7f0000001080)=""/244, 0xf4) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@in, 0x80, &(0x7f0000000100)}, 0x0) r6 = dup2(r4, r5) fcntl$setown(r6, 0x8, r3) tkill(r3, 0x16) 03:35:21 executing program 0: set_robust_list(&(0x7f0000000600)={&(0x7f0000000340)={&(0x7f0000000080)}}, 0xfffffffffffffd20) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000680)={{0xa, 0x0, 0x0, @mcast1}, {0xa, 0x0, 0x0, @loopback}}, 0x5c) pipe2$9p(&(0x7f0000000000), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getgid() getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000580)) getegid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) getegid() stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) getgroups(0x0, &(0x7f0000000540)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast1}, &(0x7f0000000500)=0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)='cgroup.stat\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") lsetxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) 03:35:21 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x100004) creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000300)) memfd_create(&(0x7f0000000040)='%[eth1em1md5summd5sum\x00', 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getegid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000480)=ANY=[], 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000bc0)={0x79, 0x7d, 0x0, {{0x0, 0x64, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x16, '%[eth1em1md5summd5sum\x00', 0x4, 'self', 0xa, 'syzkaller\x00', 0xd, '/dev/net/tun\x00'}}}, 0x79) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000400)) add_key$user(&(0x7f0000000780)='user\x00', &(0x7f00000007c0), &(0x7f0000000800), 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000840)='id_resolver\x00', &(0x7f0000000880), &(0x7f00000008c0)='*{security!bdev\x00', 0x0) request_key(&(0x7f0000000900)='syzkaller\x00', &(0x7f0000000940), &(0x7f0000000980)='nbd\x00', 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000009c0), &(0x7f0000000a00)=""/231, 0xe7, &(0x7f0000000b40)={&(0x7f0000000b00)={'sha224-avx2\x00'}}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541c4a1fa6ff60f2e1a44dbe271fb0703") 03:35:21 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='/proc/self/net/pfkey\x00'}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000740)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$intptr(0x0, 0x0) prctl$void(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x0, @broadcast}}) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000240)}) rt_sigreturn() 03:35:21 executing program 2: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000b40)=0xe8) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getgroups(0x0, &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000c80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000008c0)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x86, &(0x7f0000000740), &(0x7f00000007c0)=""/134}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000700)={0x0, 'veth0_to_bridge\x00'}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:35:21 executing program 1: keyctl$set_reqkey_keyring(0x11, 0xfffffffffffffffc) pipe(&(0x7f0000000040)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000003c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") io_setup(0x0, &(0x7f0000000080)) io_cancel(0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000440)) 03:35:22 executing program 0: keyctl$set_reqkey_keyring(0xe, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) unshare(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xfffffffffffffebd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:22 executing program 5: mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ff3000/0x4000)=nil) request_key(&(0x7f0000000600)="2e726571225900005f6b65795f617574680024f42248dece76ae932184d13d5ad98149c7342ed2d8abfe46f75658d397607174e81763fdd39d87c9b084993e412f506e16c3cb9731ae2a1a130fa0511088ef755f899c147bc9445b42c2f9104a34a0b58b49ff3f20cee9803eabd70954f15fde013ca7ca6d0fb2f1e0a554053f8964588fe66a461b85cea9b92f53506c36253fda79176eb4bd5ea5bbe95974a6b6dc50f9e8fc014c736709f40482652f777032d9f08d9391d6fcb4cbb0215b39f7042791cc14e61589aab72b9f66d4a373869a3dbcc953c0ed82e0cb84e00ddc", &(0x7f0000000740), &(0x7f00000000c0)="c61f287000", 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/mls\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0) fstat(0xffffffffffffffff, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @multicast1}, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) getuid() getegid() getegid() getresgid(&(0x7f0000000240), &(0x7f0000000480), &(0x7f00000004c0)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000900)=ANY=[], 0x0, 0x0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000007c0)={'nat\x00'}, &(0x7f0000000700)=0x24) mlockall(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x139, &(0x7f0000000080)}) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 03:35:22 executing program 3: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000180), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000740)=""/200, 0xc8, 0x0, &(0x7f0000000840)={0xa, 0x0, 0x0, @mcast1}, 0x1c) keyctl$set_reqkey_keyring(0x7, 0x0) pipe2(&(0x7f0000000240), 0x0) uname(&(0x7f0000000200)=""/39) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000140)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000039c0)={0x0, @multicast1, @loopback}, &(0x7f0000003a00)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000003a40)={0x0, 0x1, 0x6, @broadcast}, 0xfffffffffffffd8c) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000080)) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000040)) 03:35:22 executing program 2: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000b40)=0xe8) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getgroups(0x0, &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000c80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000008c0)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x86, &(0x7f0000000740), &(0x7f00000007c0)=""/134}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000700)={0x0, 'veth0_to_bridge\x00'}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:35:23 executing program 0: clock_gettime(0x7, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername(0xffffffffffffff9c, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000580)={'NETMAP\x00'}, &(0x7f00000005c0)=0x1e) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") memfd_create(&(0x7f0000000340)='wlan1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000380)='threaded\x00', 0x9) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000003c0)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000600), 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000180)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 03:35:23 executing program 5: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) lremovexattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)=ANY=[]) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) getgid() gettid() socket$key(0xf, 0x3, 0x2) clock_nanosleep(0x0, 0x0, &(0x7f0000001680), &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000700)='IPVS\x00', 0xffffffffffffffff}, 0x30) sched_rr_get_interval(0x0, &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") getrandom(&(0x7f0000001740)=""/148, 0x235, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:35:24 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[]}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00007a8fff), 0x0, 0x0, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getflags(0xffffffffffffffff, 0x0) gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) fstat(0xffffffffffffffff, &(0x7f00000007c0)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@multicast2, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000940)=0xe8) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getuid() getgroups(0x0, &(0x7f0000000bc0)) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getresgid(&(0x7f0000003500), &(0x7f0000003540), &(0x7f0000003580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a80)={{{@in, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000003b80)=0xe8) getgroups(0x0, &(0x7f0000003bc0)) getuid() stat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003cc0)={{{@in6=@local, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000003dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e00), &(0x7f0000003e40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003e80), &(0x7f0000003ec0)=0xc) stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003fc0)={{{@in, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f00000040c0)=0xe8) getgroups(0x0, &(0x7f0000004100)) stat(&(0x7f0000004140)='./file0\x00', &(0x7f0000004180)) getgroups(0x0, &(0x7f0000004200)) geteuid() getegid() geteuid() getgroups(0x0, &(0x7f0000005640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005680)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000005780)=0xe8) getgroups(0x0, &(0x7f00000057c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006a00)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000006b00)=0xe8) getresgid(&(0x7f0000006b40), &(0x7f0000006b80), &(0x7f0000006bc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006c00)={{{@in6, @in=@local}}, {{@in6=@remote}}}, &(0x7f0000006d00)=0xe8) getresgid(&(0x7f0000006d40), &(0x7f0000006d80), &(0x7f0000006dc0)) lstat(&(0x7f0000006e00)='./file0\x00', &(0x7f0000006e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006ec0), &(0x7f0000006f00)=0xc) geteuid() fstat(0xffffffffffffffff, &(0x7f0000006f40)) stat(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007080), &(0x7f00000070c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007100)={{{@in6=@dev, @in6=@mcast2}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000007200)=0xe8) getresgid(&(0x7f0000007240), &(0x7f0000007280), &(0x7f00000072c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007300)={{{@in, @in=@loopback}}, {{}, 0x0, @in=@rand_addr}}, &(0x7f0000007400)=0xe8) getgid() getresuid(&(0x7f0000007440), &(0x7f0000007480), &(0x7f00000074c0)) lstat(&(0x7f0000007500)='./file0\x00', &(0x7f0000007540)) geteuid() getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007900)={{{@in6, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000007a00)=0xe8) getgroups(0x0, &(0x7f0000007a40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007a80)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000007b80)=0xe8) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007bc0)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000007cc0)=0xe8) getgroups(0x0, &(0x7f0000007d00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000080c0)={{{@in, @in=@remote}}, {{}, 0x0, @in6=@loopback}}, &(0x7f00000081c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008200), &(0x7f0000008240)=0xc) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") 03:35:24 executing program 1: eventfd2(0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001580)='./file0\x00', &(0x7f00000015c0)) getgroups(0x0, &(0x7f0000001640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001680)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000016c0)={{{@in6=@ipv4={[], [], @loopback}, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000017c0)=0xe8) lstat(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000018c0)) lstat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getgid() getpgrp(0x0) geteuid() getresgid(&(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000022c0), &(0x7f0000002300)=0xc) stat(&(0x7f0000002340)='./file0\x00', &(0x7f0000002380)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000140)=0x245) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002480), &(0x7f00000024c0)=0xc) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000027c0)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000002880)) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000002900)='/selinux/create\x00', 0x2, 0x0) getpgrp(0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000002940)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002d80)={{{@in=@multicast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000002e80)=0xe8) stat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002f80)) getuid() getresgid(&(0x7f0000002fc0), &(0x7f0000003000), &(0x7f0000003040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004300)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004340), &(0x7f0000004380)=0xc) getgroups(0x0, &(0x7f00000043c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004640)={{{@in6=@local, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000004740)=0xe8) getresgid(&(0x7f0000004780), &(0x7f00000047c0), &(0x7f0000004800)) getresuid(&(0x7f00000048c0), &(0x7f0000004900), &(0x7f0000004940)) getgroups(0x0, &(0x7f0000004980)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004cc0)) lstat(&(0x7f0000004d00)='./file0\x00', &(0x7f0000004d40)) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004e80)) geteuid() getegid() gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004ec0)={{{@in6, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000004fc0)=0xe8) getegid() getpid() getuid() fstat(0xffffffffffffffff, &(0x7f00000052c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005340), &(0x7f0000005380)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000053c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000054c0)=0xe8) stat(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000055c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000005600)={{{@in=@multicast2, @in6}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000005700)=0xe8) getgroups(0x0, &(0x7f0000005740)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005780)) getpgrp(0x0) getresuid(&(0x7f0000005ac0), &(0x7f0000005b00), &(0x7f0000005b40)) stat(&(0x7f0000005b80)='./file0\x00', &(0x7f0000005bc0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000005c40)) getresuid(&(0x7f0000005c80), &(0x7f0000005cc0), &(0x7f0000005d00)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005d40), &(0x7f0000005d80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000005dc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005e00)={{{@in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005f00)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:24 executing program 3: clock_gettime(0x0, &(0x7f0000000300)) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) close(0xffffffffffffffff) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f0000001880)={&(0x7f00000000c0)=ANY=[]}}, 0x0) prctl$setname(0xf, &(0x7f0000000040)='selinux@*bdev\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000180), 0x4) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f00000001c0), 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000000c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000340)=@generic) 03:35:24 executing program 2: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000b40)=0xe8) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getgroups(0x0, &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000c80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000008c0)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x86, &(0x7f0000000740), &(0x7f00000007c0)=""/134}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000700)={0x0, 'veth0_to_bridge\x00'}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:35:24 executing program 5: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) clock_getres(0x0, &(0x7f0000000400)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:35:24 executing program 0: futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f00000005c0), &(0x7f0000000640)='ppp1\x00', 0xffffffffffffffff) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000300), &(0x7f0000000640), 0x0, 0x0) add_key(&(0x7f0000000700)='cifs.idmap\x00', &(0x7f0000000740), 0x0, 0x1b2, 0xfffffffffffffff9) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240), &(0x7f0000000980), 0x0, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f00000008c0), &(0x7f0000000900)=""/38, 0x26, &(0x7f0000000a40)={&(0x7f0000000940)={'sha256-generic\x00'}, &(0x7f0000000980), 0xe8}) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) socket$nl_netfilter(0x10, 0x3, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$nl_netfilter(0x10, 0x3, 0xc) clock_settime(0x0, &(0x7f00000004c0)={0x0, 0x989680}) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:24 executing program 5: ioprio_get$pid(0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) chroot(&(0x7f0000000380)='./file1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0xfffffffffffffef3) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/zero\x00'}, 0x30) getpgid(0xffffffffffffffff) gettid() lstat(&(0x7f0000000340)='./file0\x00', &(0x7f00000007c0)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000008c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001040)={{{@in6=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000001140)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001180)={{{@in6=@dev, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000001280)=0xe8) stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) 03:35:24 executing program 4: getpriority(0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000080)=0xfffffffffffffdf6) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000001040)=0xe8) getegid() getuid() getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000004c0)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) chroot(&(0x7f0000000380)='./file1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:35:25 executing program 0: epoll_create(0x3) seccomp(0x0, 0x0, &(0x7f0000000080)={0x15d, &(0x7f0000000180)}) io_setup(0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/route\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000440), 0x2c) memfd_create(&(0x7f00000014c0)='nodev\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000340)="42805da0be0fef69dc0f01eec402618c2273fe19fa380f3621d5d5f3000001b5e5bc2b0045000021676743f1225d04366b2179dae5f5a04141450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:25 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) accept$unix(0xffffffffffffff9c, &(0x7f0000000c80), &(0x7f0000000d00)=0x6e) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/create\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000480)=0x1c) epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) ioperm(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000200), 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000049c0)={@broadcast, @local}, &(0x7f0000004980)=0xc) eventfd2(0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/rtc0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000ac0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000fc0)) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getegid() gettid() getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000001180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003f80)) geteuid() getegid() 03:35:25 executing program 0: unshare(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000800)=""/4) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000240)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/keychord\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000003e40)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) getresuid(&(0x7f0000000780), &(0x7f00000029c0), &(0x7f0000002a00)) lstat(&(0x7f0000002a40)='./file0/file0\x00', &(0x7f0000002a80)) getresuid(&(0x7f0000002b00), &(0x7f0000002b40), &(0x7f0000002b80)) getresgid(&(0x7f0000002bc0), &(0x7f0000002c00), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003300)={{{@in6=@local, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000003400)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003440)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000034c0)={{{@in=@broadcast, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f00000035c0)=0xe8) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000036c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000037c0)=0xe8) getresgid(&(0x7f0000003800), &(0x7f0000003840), &(0x7f0000003880)) fstat(0xffffffffffffffff, &(0x7f00000038c0)) getgid() getresuid(&(0x7f0000003940), &(0x7f0000003980), &(0x7f00000039c0)) lstat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000003a40)) lstat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003cc0), 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000840)=""/4096) ptrace$peekuser(0x3, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)=ANY=[], 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0x0) keyctl$describe(0x6, 0x0, &(0x7f0000000440)=""/155, 0x9b) syz_execute_func(&(0x7f0000000540)="428055a0336969ef69dc364180c7e041a30f7f7f3766460f38285230c4637905a70d000000c135c935c97d197a0779fb8f2860ceeba679cbff43d0e1460f0da11b000000010d64ac1e5d31a314b706e242d08039c52a7d987b7f") 03:35:25 executing program 4: futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='cgroup.type\x00'}, 0x10) epoll_create1(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={0x0, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @multicast1}}}, 0x108) pipe(&(0x7f00000000c0)) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000380)) getpgid(0x0) stat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@dev, @in=@multicast2}}}, &(0x7f0000000b00)=0xe8) getpid() stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) clock_getres(0x0, &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:26 executing program 0: mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000140)=0x6e) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f00000002c0)=""/233) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") writev(0xffffffffffffffff, &(0x7f00000001c0), 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)) request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580), &(0x7f00000005c0)='/selinux/enforce\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000480)='encrypted\x00', &(0x7f00000004c0), &(0x7f0000000500)='trusted\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000440)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000000800)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') getuid() ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000a80)=ANY=[]) 03:35:27 executing program 1: signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) syncfs(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x0, @mcast2}, 0x1c) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000140)}) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x0, &(0x7f00000009c0)={0x77359400}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000340)={0x0, &(0x7f0000000280)}, 0x10) mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000080)) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/67) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000480)={0x43}, 0x43) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000005c0)=0x1c) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f00000002c0)=0x1e) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000500)={0x43}, 0x43) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000380)=""/201, &(0x7f0000000300)=0xc9) 03:35:27 executing program 3: ioprio_set$uid(0x3, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000500)}}, 0x18) gettid() socket$nl_netfilter(0x10, 0x3, 0xc) timerfd_create(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000180)) io_cancel(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f0000000340)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) signalfd(0xffffffffffffffff, &(0x7f0000000480), 0x8) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) clock_gettime(0x0, &(0x7f0000004480)) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, &(0x7f00000044c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") getpgrp(0xffffffffffffffff) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/138) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 03:35:27 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) accept$unix(0xffffffffffffff9c, &(0x7f0000000c80), &(0x7f0000000d00)=0x6e) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/create\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000480)=0x1c) epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) ioperm(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000200), 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000049c0)={@broadcast, @local}, &(0x7f0000004980)=0xc) eventfd2(0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/rtc0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000ac0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000fc0)) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getegid() gettid() getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000001180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003f80)) geteuid() getegid() 03:35:27 executing program 4: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x259) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in=@local}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000180)=0xe8) getgroups(0x0, &(0x7f0000000680)) stat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000b40)) getegid() fstat(0xffffffffffffffff, &(0x7f0000001f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000800)=0x9) fstat(0xffffffffffffffff, &(0x7f0000002340)) getgid() fstat(0xffffffffffffffff, &(0x7f00000023c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000002480)=0xc) getgroups(0x0, &(0x7f00000024c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002500), &(0x7f0000002540)=0xc) getresgid(&(0x7f0000002580), &(0x7f00000025c0), &(0x7f0000002600)) getresuid(&(0x7f0000002640), &(0x7f0000002680), &(0x7f00000026c0)) getegid() getresuid(&(0x7f0000002700), &(0x7f0000002740), &(0x7f00000000c0)) fstat(0xffffffffffffffff, &(0x7f00000027c0)) fstat(0xffffffffffffffff, &(0x7f0000000240)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000005200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getresuid(&(0x7f0000005240), &(0x7f0000005280), &(0x7f00000052c0)) getresgid(&(0x7f0000005300), &(0x7f0000005340), &(0x7f0000005380)) getresgid(&(0x7f0000005480), &(0x7f00000054c0), &(0x7f0000005500)) lstat(&(0x7f0000006700)='./file0\x00', &(0x7f0000006740)) stat(&(0x7f00000067c0)='./file0\x00', &(0x7f0000006800)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000006880)='/selinux/context\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000068c0), &(0x7f0000006900)=0xc) getgid() getuid() getegid() getresuid(&(0x7f0000006bc0), &(0x7f0000006c00), &(0x7f0000006c40)) getgid() lstat(&(0x7f0000006c80)='./file0\x00', &(0x7f0000006cc0)) fstat(0xffffffffffffffff, &(0x7f0000006d40)) geteuid() getresgid(&(0x7f0000006dc0), &(0x7f0000006e00), &(0x7f0000006e40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006e80)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000006f80)=0xe8) stat(&(0x7f0000006fc0)='./file0\x00', &(0x7f0000007000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007480)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000007580)=0xe8) getgroups(0x0, &(0x7f00000075c0)) geteuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007600), &(0x7f0000007640)=0xc) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007740), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@multicast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007900)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xffffffffffffff7d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in6, @in=@remote}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000e40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000ec0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:35:27 executing program 0: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0xffffffffffffffff) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getpid() stat(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000880)) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000900)=@raw, &(0x7f0000000980)='syzkaller\x00'}, 0x48) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000a40)) geteuid() getgroups(0x0, &(0x7f0000000a80)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000032c0)) timerfd_create(0x0, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000003300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003340)={{{@in=@local, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000003440)=0xe8) getresgid(&(0x7f0000003480), &(0x7f00000034c0), &(0x7f0000003500)) openat$rtc(0xffffffffffffff9c, &(0x7f0000003540)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000003580)='/selinux/access\x00', 0x2, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000035c0)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000003600)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000003640)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003680)=0xffffffffffffffff, 0x4) openat$urandom(0xffffffffffffff9c, &(0x7f00000036c0)='/dev/urandom\x00', 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000003700)='/selinux/load\x00', 0x2, 0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000003740), 0x0) signalfd(0xffffffffffffff9c, &(0x7f0000003780), 0x8) accept$inet(0xffffffffffffff9c, &(0x7f00000037c0)={0x2, 0x0, @dev}, &(0x7f0000003800)=0x10) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000003840)='./file1\x00', &(0x7f0000003880)) getresgid(&(0x7f0000003900), &(0x7f0000003940), &(0x7f0000003980)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000004ec0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000004f00)=0x1c, 0x0) accept4(0xffffffffffffffff, &(0x7f0000004f40)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000004fc0)=0x80, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000005000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000005040)='/dev/uinput\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000005080)='/dev/keychord\x00', 0x0, 0x0) creat(&(0x7f00000050c0)='./file1/file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000005100)='/dev/urandom\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000005140)='ns/pid_for_children\x00') openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000005180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f00000051c0)='/dev/ion\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000052c0)='/dev/ppp\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000005300)='/selinux/access\x00', 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept$packet(0xffffffffffffffff, &(0x7f0000005340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005380)=0x14) pipe2$9p(&(0x7f00000053c0), 0x0) accept(0xffffffffffffffff, &(0x7f0000005400)=@generic, &(0x7f0000005480)=0x80) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000054c0)='/dev/loop-control\x00', 0x0, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000005500)) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000005540)='cgroup.procs\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000005580)='/selinux/policy\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000055c0)='/dev/rtc0\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000005640)={&(0x7f0000005600)='./file1\x00'}, 0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005740), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket(0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000340)="63904d75cff0edde039c2fe107726e6e08a24965cc4bcee9c632768c0fb56745c0fe28e38e4c895b5ce0861061c3bbc4fe864428f15c79dabd98c6cda03a9862ccb23abb629c124d0a3a7d662781cc2fd20967dd9b2d568cac103f7f2cddd4b166a42f2f73a10af60cb2048df4ba602795d48a9c26cef37c1bbb4c78505a133aa15897bf78c3bb6c23b91bc880d444e745e7f761ba04be210cfa3e9c03aae0b5a1866ebd94f3731c2e88f15a2cb295d4c7b16dff97302a415e3dbbd40165ba47576ba6ef567f038a6a2f9cb32114a31b13c80697586b6c3ebe695ec752efad1c93d03b9521100a0c61e20c3a69fa562e2b32dd684f4557e817a23d8b1a83be3e") socket$packet(0x11, 0x0, 0x300) accept(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000140)=0x1e2) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000480)) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) socket$inet_tcp(0x2, 0x1, 0x0) syz_execute_func(&(0x7f00000002c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97dc401fbf0bcc2af00000079fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)}, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="9877d42ebb4a023ffdbfb558d968f12b", 0x10) 03:35:27 executing program 2: wait4(0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000180)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000900)) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000b40)=0xe8) getgroups(0x0, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getgroups(0x0, &(0x7f0000000c40)) getgroups(0x0, &(0x7f0000000c80)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000008c0)='system.posix_acl_default\x00', &(0x7f0000000580)=ANY=[], 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={0xffffffffffffffff, 0x0, 0x0, 0x86, &(0x7f0000000740), &(0x7f00000007c0)=""/134}, 0x28) openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000700)={0x0, 'veth0_to_bridge\x00'}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:35:28 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) accept$unix(0xffffffffffffff9c, &(0x7f0000000c80), &(0x7f0000000d00)=0x6e) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/create\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000480)=0x1c) epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) ioperm(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000200), 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000049c0)={@broadcast, @local}, &(0x7f0000004980)=0xc) eventfd2(0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/rtc0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000ac0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000fc0)) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getegid() gettid() getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000001180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003f80)) geteuid() getegid() 03:35:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, &(0x7f0000000700)=ANY=[]) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000500)='bpf\x00', 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000001900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, &(0x7f0000000540)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, &(0x7f0000000900)=ANY=[]) mount$bpf(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='bpf\x00', 0x20000, &(0x7f0000000300)=ANY=[]) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x81001, &(0x7f0000000480)) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 03:35:28 executing program 4: futex(&(0x7f0000000440), 0x6, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@rand_addr, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000f40)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006300)={@loopback}, &(0x7f0000006340)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006380)={@ipv4={[], [], @dev}}, &(0x7f00000063c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006440)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006480)={{{@in=@broadcast, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000006580)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000000380), 0xc, &(0x7f0000006a40)={&(0x7f00000065c0)=ANY=[]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000180)) socket$unix(0x1, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000740)) getpgrp(0xffffffffffffffff) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000140)) finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) socket$packet(0x11, 0x0, 0x300) 03:35:28 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x6c, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) time(&(0x7f0000000340)) setrlimit(0x0, &(0x7f0000000040)) creat(&(0x7f0000000780)='./file0\x00', 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000007c0)) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000080), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xfffffd7e) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000005c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000140), 0x1c) seccomp(0x0, 0x0, &(0x7f0000000880)={0x0, &(0x7f0000000800)}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, 0x1c) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000008c0)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:29 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)) accept$unix(0xffffffffffffff9c, &(0x7f0000000c80), &(0x7f0000000d00)=0x6e) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/create\x00', 0x2, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000480)=0x1c) epoll_create(0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[], &(0x7f00000001c0)=""/27, 0x1b) llistxattr(&(0x7f00000015c0)='./file0\x00', &(0x7f00000016c0)=""/210, 0xfffffee3) ioperm(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) syz_execute_func(&(0x7f0000000140)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe22e26f265ddd6c4c1d9fb61e9") open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000580), 0x0, 0x0, &(0x7f0000000200), 0x10) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000049c0)={@broadcast, @local}, &(0x7f0000004980)=0xc) eventfd2(0x0, 0x0) socket$key(0xf, 0x3, 0x2) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000004c0)='/dev/rtc0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000ac0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b00), &(0x7f0000000b40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000fc0)) getresuid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getegid() gettid() getresuid(&(0x7f0000000540), &(0x7f0000000500), &(0x7f0000000400)) fstat(0xffffffffffffffff, &(0x7f0000001180)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003f80)) geteuid() getegid() 03:35:29 executing program 0: keyctl$invalidate(0x15, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f00000000c0)='GPL\x00', 0x0, 0x7f, &(0x7f0000000140)=""/127}, 0x48) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000003c0)) stat(&(0x7f0000000680)='./file1\x00', &(0x7f00000006c0)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xfffffffffffffda6) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000200)='syz1\x00') getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000880)={{{@in6=@mcast2, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) pipe2(&(0x7f0000000000), 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, &(0x7f0000000100)=0x6e) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc364134aa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f99197a077966c463fd7998b400ba000079aaff43d0c4a145f8170f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in, @in=@broadcast}}, {{@in6=@mcast2}}}, &(0x7f0000000ac0)=0x27f) stat(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000600)) getgroups(0xac, &(0x7f0000000bc0)) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getegid() lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getgid() unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) ptrace(0xffffffffffffffff, 0x0) 03:35:29 executing program 1: time(&(0x7f0000000380)) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f00000007c0)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000180), &(0x7f0000000240)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000400)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000780)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in6, @in6}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000c40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000c80), &(0x7f0000000cc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000e00)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000e40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000001840), 0x0, 0x0, &(0x7f0000001900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001940)={{{@in6, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000001a40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d80)={{{@in6=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001ec0)={{{@in6=@dev, @in6=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f0000001fc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002040)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002080)={@ipv4={[], [], @rand_addr}}, &(0x7f00000020c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002140)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000740), 0xc, &(0x7f0000002740)={&(0x7f00000027c0)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f00000005c0)) finit_module(0xffffffffffffffff, &(0x7f00000006c0)="2e5e657468315d5e6d696d655f747970657dab00", 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640)) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000680)={0x18}, 0x2e8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6, @in6}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000140)=0x3ff) openat$pfkey(0xffffffffffffff9c, &(0x7f0000006f80)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in=@loopback, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000006fc0)={@in={{0x2, 0x0, @rand_addr}}, 0x0, 0x0, 0x0, "086c499f3268e050e23d063c0f6f0878363d3380e461f36413dadedb175a7d17ec38fcc53513442e639a43afb88b49f2ab4d3e77263111a42c33e209cdca15e10f37c5c205c4122cc252caaca4fd86e6"}, 0xd8) 03:35:30 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:30 executing program 4: futex(&(0x7f0000000440), 0x6, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@rand_addr, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000f40)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006300)={@loopback}, &(0x7f0000006340)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006380)={@ipv4={[], [], @dev}}, &(0x7f00000063c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006440)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006480)={{{@in=@broadcast, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000006580)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000000380), 0xc, &(0x7f0000006a40)={&(0x7f00000065c0)=ANY=[]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000180)) socket$unix(0x1, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000740)) getpgrp(0xffffffffffffffff) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000140)) finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) socket$packet(0x11, 0x0, 0x300) 03:35:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000001cc0), 0x8, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_execute_func(&(0x7f00000002c0)="428055a08a6969ef69dc00d9c4c279596811c841ff0fa2183737c3397c2a060f38211a40a5c19086d9f2c94b4b0feefae5e55d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000003a00), 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003b80)={'ip_vti0\x00'}) 03:35:30 executing program 2: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[], 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:30 executing program 0: add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340), &(0x7f0000000ac0), 0x0, 0x0) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f00000006c0), 0x0, 0x0, 0x0) open(&(0x7f0000000580)='./file1\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000008c0)='/dev/vga_arbiter\x00') openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001200)) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000200)=0xc) getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000600)='%/@>\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000780)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000880)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000940)='#}eth1[\x00'}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b00)) getpgrp(0x0) stat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc) getpid() getresuid(&(0x7f0000001480), &(0x7f00000014c0), &(0x7f0000001500)) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x29, &(0x7f0000001600)='system_u:object_r:public_content_rw_t:s0\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001680)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@mcast2}}, &(0x7f0000001780)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f00000017c0), &(0x7f0000001800), &(0x7f0000001840)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001880)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000001980)=0xe8) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001a00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001ac0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001a80)='\x00'}, 0x30) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b00), &(0x7f0000001b40)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f00000009c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001140), 0x0, &(0x7f0000001f00)=ANY=[]}, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000900)) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000000cc0)="030000006574307379737486c4656d706f7369785f61636cbe61636365737300f7d74fc2ea19c62cc3134ff33a2eb33d8e76b448ae7c8f0a4ab94f31625d97a146b2c1069ef17c83c5e92a371f444e0b325fe04cbf1effd6c97088cb366d0ccd2e1baef94f782cc257328dd0d1845e97ce73682a177358006cd863be1b740b86e1e2daec69e3adb5f677903b0ca78d115a6adc766afcc0be2870f3f5f03af3270ec6d5308ff5b4e4c543a8091eb9694691b10a805dcd977aea7162835c96afe0cb67a0911677aa431a296b9562abb87aa6a7fdd71cca39061bc6f2b51da83226ff2ae6fbc81ce051d07875b413aed7") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000980)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) write$selinux_context(0xffffffffffffffff, &(0x7f0000000400)='system_u:object_r:public_content_rw_t:s0\x00', 0x29) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) set_thread_area(&(0x7f0000000500)) getrlimit(0x0, &(0x7f0000000280)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setfpexc(0xc, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a80)="428055a0fffafa292b29f4e684e68400d9ce418fff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e5c3e7250050ddca0f2e1a2e46d1489d064ae2989f") setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000980), 0x0) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:30 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, 0x10) keyctl$session_to_parent(0x12) inotify_init() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@mcast2, @in6}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in=@broadcast, @in=@dev}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000001c0)={0x77359400}, 0x10) geteuid() getuid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000540)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a80)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000200)={0x0, @aes256, 0x0, "1bb7a216d653c0aa"}) getgroups(0x1d, &(0x7f0000000640)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000840)=0xfffffffffffffe3d) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:30 executing program 4: futex(&(0x7f0000000440), 0x6, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@rand_addr, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000f40)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006300)={@loopback}, &(0x7f0000006340)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006380)={@ipv4={[], [], @dev}}, &(0x7f00000063c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006440)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006480)={{{@in=@broadcast, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000006580)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000000380), 0xc, &(0x7f0000006a40)={&(0x7f00000065c0)=ANY=[]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000180)) socket$unix(0x1, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000740)) getpgrp(0xffffffffffffffff) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000140)) finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) socket$packet(0x11, 0x0, 0x300) 03:35:30 executing program 5: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffe) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x391, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000940)=0xc) geteuid() lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000001280)) getpgid(0xffffffffffffffff) geteuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a00)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000001a40)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40)) fstat(0xffffffffffffffff, &(0x7f0000001ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f80), &(0x7f0000001fc0)=0xc) getgroups(0x154, &(0x7f0000002000)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002080)={0x0, 0xffffffffffffffff, 0x0, 0x22, &(0x7f0000002040)='eth0eth1/ppp0vmnet0}selinux\\bdev+\x00', 0xffffffffffffffff}, 0x30) getresgid(&(0x7f0000002180), 0x0, &(0x7f00000021c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002240)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002200)='^cpuset\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002280)='./file0\x00', &(0x7f00000022c0)) inotify_init() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) memfd_create(&(0x7f0000006840)='gre0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006900)={{{@in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:35:31 executing program 4: futex(&(0x7f0000000440), 0x6, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getpgid(0x0) accept4(0xffffffffffffffff, &(0x7f00000001c0)=@nfc, &(0x7f00000002c0)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000640)={{{@in=@local, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000800)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000000900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000980)=0x80) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a40)={@rand_addr, @loopback}, &(0x7f0000000a80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000f40)={{{@in6=@dev, @in=@multicast2}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001280)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006300)={@loopback}, &(0x7f0000006340)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000006380)={@ipv4={[], [], @dev}}, &(0x7f00000063c0)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000006400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006440)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006480)={{{@in=@broadcast, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000006580)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006a80)={&(0x7f0000000380), 0xc, &(0x7f0000006a40)={&(0x7f00000065c0)=ANY=[]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000015c0)={&(0x7f0000001540)='IPVS\x00', 0xffffffffffffff9c}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000180)) socket$unix(0x1, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000740)) getpgrp(0xffffffffffffffff) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000140)) finit_module(0xffffffffffffffff, &(0x7f00000000c0)="2dc200", 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b7e2989f7f") ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) socket$packet(0x11, 0x0, 0x300) 03:35:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x80}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020006080600000006bd7000fbdbdf2502000b0000000000b7ffffffffff41ff02000100000004d40000170000000000"], 0x30}}, 0x4000000) preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000001700)=""/249, 0xf9}, {&(0x7f0000000240)=""/191, 0xbf}, {&(0x7f00000003c0)=""/34, 0x22}], 0x3, 0x100000000) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000100)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f00000000c0)) r3 = add_key(&(0x7f00000004c0)='ceph\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r4 = getuid() keyctl$chown(0x4, r3, r4, 0x0) 03:35:31 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:31 executing program 1: getrandom(&(0x7f0000000040)=""/148, 0xfffffffffffffd2b, 0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) execve(&(0x7f0000000600)='./file0\x00', &(0x7f0000000200), &(0x7f0000000c00)) accept4$unix(0xffffffffffffff9c, &(0x7f0000000c40), &(0x7f0000000040)=0x6e, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000cc0), 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/access\x00', 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000d40)='cgroup.type\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000d80)='team0\x00', 0xffffffffffffff9c}, 0x10) poll(&(0x7f00000002c0)=[{r0, 0x100}], 0x1, 0x7234) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000e00)='/selinux/enforce\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001080)=0xe8) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'team0\x00'}) 03:35:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x80}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020006080600000006bd7000fbdbdf2502000b0000000000b7ffffffffff41ff02000100000004d40000170000000000"], 0x30}}, 0x4000000) preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000001700)=""/249, 0xf9}, {&(0x7f0000000240)=""/191, 0xbf}, {&(0x7f00000003c0)=""/34, 0x22}], 0x3, 0x100000000) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000100)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f00000000c0)) r3 = add_key(&(0x7f00000004c0)='ceph\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r4 = getuid() keyctl$chown(0x4, r3, r4, 0x0) 03:35:31 executing program 2: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[], 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:31 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x80}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020006080600000006bd7000fbdbdf2502000b0000000000b7ffffffffff41ff02000100000004d40000170000000000"], 0x30}}, 0x4000000) preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000001700)=""/249, 0xf9}, {&(0x7f0000000240)=""/191, 0xbf}, {&(0x7f00000003c0)=""/34, 0x22}], 0x3, 0x100000000) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000100)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f00000000c0)) r3 = add_key(&(0x7f00000004c0)='ceph\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r4 = getuid() keyctl$chown(0x4, r3, r4, 0x0) 03:35:31 executing program 5: unlink(&(0x7f00000004c0)='./file0\x00') prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000800)) lstat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000600)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000500)=0xe8) stat(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000a80)="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") dup(0xffffffffffffffff) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000009c0)}) socket$nl_netfilter(0x10, 0x3, 0xc) openat$ppp(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:35:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x94}], 0x1, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0x10, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x80}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') sendmsg$key(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020006080600000006bd7000fbdbdf2502000b0000000000b7ffffffffff41ff02000100000004d40000170000000000"], 0x30}}, 0x4000000) preadv(0xffffffffffffffff, &(0x7f0000000440)=[{&(0x7f0000001700)=""/249, 0xf9}, {&(0x7f0000000240)=""/191, 0xbf}, {&(0x7f00000003c0)=""/34, 0x22}], 0x3, 0x100000000) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000100)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f00000000c0)) r3 = add_key(&(0x7f00000004c0)='ceph\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r4 = getuid() keyctl$chown(0x4, r3, r4, 0x0) 03:35:31 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f0000000480)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:35:31 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000300)=""/227, 0xe3}, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000640)={0x0, {{0x2, 0x0, @loopback}}}, 0x88) eventfd(0x0) dup(0xffffffffffffffff) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000005c0)={@local, @mcast2}) ftruncate(0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x387, 0x0) eventfd(0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={@empty, @remote}, &(0x7f0000000240)=0xc) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000180)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000240)) clock_settime(0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='westwood\x00', 0x9) 03:35:32 executing program 4: times(&(0x7f0000000040)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000980)=@req) sysinfo(&(0x7f0000000140)=""/245) syz_open_pts(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000840)) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000002c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000600)={'veth0_to_bridge\x00'}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000800)) getresgid(&(0x7f00000000c0), &(0x7f00000002c0), &(0x7f00000008c0)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000004c0), &(0x7f00000005c0)=0x4) fstat(0xffffffffffffffff, &(0x7f0000000500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000480)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), 0xc) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000900), 0x0) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000740)) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000580)) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") seccomp(0x0, 0x0, &(0x7f0000000440)={0x0, &(0x7f0000000400)}) 03:35:32 executing program 5: inotify_init() recvmmsg(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) pipe(&(0x7f0000000080)) accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000140)=0x244) dup(0xffffffffffffffff) getuid() getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast2, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@multicast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000900)) lsetxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000980), 0x24, 0x0) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000180)='\x00', 0xfffffffffffffffa) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000b00)='team0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@loopback, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, 0xe8) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:32 executing program 0: io_setup(0x5, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f8af4a212") 03:35:33 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000680)='attr/sockcreate\x00') dup(0xffffffffffffffff) creat(&(0x7f0000000a80)='./file0\x00', 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000b40)='net/ptype\x00') dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000b80)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000640)) clock_gettime(0x0, &(0x7f0000000540)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f0000000900), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x3}) ioctl$TIOCSSOFTCAR(r1, 0x5412, &(0x7f0000000100)=0x3) 03:35:33 executing program 2: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[], 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:33 executing program 5: unshare(0xfffffffffffffffd) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000240)) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast2, @multicast2}, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @rand_addr}, 'syzkaller0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:35:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x3}) ioctl$TIOCSSOFTCAR(r1, 0x5412, &(0x7f0000000100)=0x3) 03:35:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x3}) ioctl$TIOCSSOFTCAR(r1, 0x5412, &(0x7f0000000100)=0x3) 03:35:33 executing program 3: prctl$intptr(0x8, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040), 0xc) getresuid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@ipv4}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000400)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) openat$dir(0xffffffffffffff9c, &(0x7f0000000b80)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/vga_arbiter\x00', 0x0, 0x0) symlinkat(&(0x7f0000000ac0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00') signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) geteuid() stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) getgroups(0x0, &(0x7f0000000880)) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000c40)=ANY=[], 0x0, 0x0) fstat(0xffffffffffffff9c, &(0x7f00000008c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000d40)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0bdf2ef1f6994dc94dceece49aefe1919cdfcc4012e91f72c8d0000808046800e001af3040081b5e5bcd2000000ee67f00fbab204000000ca6be979a9a9460f3a4045d7a1e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 03:35:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x3}) ioctl$TIOCSSOFTCAR(r1, 0x5412, &(0x7f0000000100)=0x3) 03:35:33 executing program 4: inotify_init() accept$inet6(0xffffffffffffff9c, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f00000000c0)=0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) clock_adjtime(0x0, &(0x7f0000000440)) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000140)={'icmp\x00'}, &(0x7f0000000280)=0x1e) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/60, &(0x7f0000000080)=0x354) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000340), 0x4) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380), 0x4) 03:35:33 executing program 0: io_setup(0x5, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f8af4a212") 03:35:34 executing program 5: seccomp(0x2, 0x0, &(0x7f0000000440)={0x0, &(0x7f0000000100)}) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000400)=0x1c, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000140)={'team_slave_0\x00', {0x2, 0x0, @multicast1}}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000640)={0x0, {{0xa, 0x0, 0x0, @loopback}}}, 0x88) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000880)) openat$full(0xffffffffffffff9c, &(0x7f0000000380)='/dev/full\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) statfs(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/103) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000600)=0xc) syz_open_procfs(0x0, &(0x7f0000000500)='net/wireless\x00') seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000004c0)) memfd_create(&(0x7f0000000000)='\x00', 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:34 executing program 0: io_setup(0x5, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f8af4a212") 03:35:35 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @empty, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) prlimit64(0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f00000002c0)={'ip6_vti0\x00'}) fstat(0xffffffffffffffff, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) syz_execute_func(&(0x7f0000000340)="428055a0690fef69dc3641ffaa32233333ce41ff0f3766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff754547daa2852b6f25050d7de5101bc6c65d14b706e298987b7f") write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) syz_execute_func(&(0x7f00000004c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefae5e5417545c4010d64ac1e5d31a3b7e2989f3f") 03:35:35 executing program 4: rt_sigaction(0x0, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='wchan\x00') futimesat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={{0x77359400}, {0x0, 0x7530}}) times(&(0x7f0000000240)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000700)) rt_sigprocmask(0x0, &(0x7f0000000040), &(0x7f0000000140), 0x8) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) sync() eventfd2(0x0, 0x0) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) syz_execute_func(&(0x7f0000000300)="428055a062c421a05d2f8a20c4211de01c73c3397c2a0f0fcd30a31a40a5c07f41df0f01efe5e57d0fecec1a1a01460f01ee45dfde9f") ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000000c0)) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) unshare(0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000003c0)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)={@broadcast, @multicast2}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f000043e000)={0x0, {{0x2, 0x0, @multicast1}}}, 0x90) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000440)) creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000080)={&(0x7f000090f000/0x4000)=nil, 0x4000}, &(0x7f0000000400)=0x10) 03:35:35 executing program 1: syz_extract_tcp_res$synack(&(0x7f00000008c0), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000940)="c4a1f8ae1b805da0616969692295d320f3410f2c2c9f6f41ff0f1837370f38211ac19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:35:35 executing program 0: io_setup(0x5, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f8af4a212") 03:35:35 executing program 2: futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000200)) creat(&(0x7f0000000480)='./file0\x00', 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000240)=ANY=[], 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:35 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") dup(0xffffffffffffff9c) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@hci, &(0x7f0000000280)=0x80) accept(0xffffffffffffff9c, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0, &(0x7f0000001540)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @dev, @loopback}, &(0x7f0000001600)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @broadcast}, &(0x7f0000001880)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@dev}, &(0x7f0000001900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001940)={'bridge0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000044c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004500)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000046c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004840)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000004940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004980)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005000)={&(0x7f0000000080), 0xc, &(0x7f0000004fc0)={&(0x7f00000049c0)={0x14}, 0x14}}, 0x0) 03:35:36 executing program 4: sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000c80)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000ac0)=""/204) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000006c0)) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000008c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003cc0)={{{@in6, @in=@local}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000bc0)) getpid() stat(&(0x7f0000000980)='./file0\x00', &(0x7f0000003dc0)) stat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000003e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006180), &(0x7f00000061c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006200)={{{@in=@dev, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006300)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006340)) geteuid() getresgid(&(0x7f0000006380), &(0x7f00000063c0), &(0x7f0000006400)) getpgid(0xffffffffffffffff) lstat(&(0x7f00000079c0)='./file0\x00', &(0x7f0000007a00)) getgroups(0x0, &(0x7f0000007a80)) openat(0xffffffffffffffff, &(0x7f0000007b80)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007bc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007c00)={{{@in6=@remote, @in6}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000007d00)=0xe8) lstat(&(0x7f0000007d40)='./file0\x00', &(0x7f0000007d80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000007e00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007e40)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@dev}}, {{@in=@multicast1}}}, &(0x7f0000007f40)=0xe8) lstat(&(0x7f0000007f80)='./file0\x00', &(0x7f0000007fc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008180), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='/dev/ptmx\x00', 0xffffffffffffff9c}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000009c0)=""/200, 0xc8) readv(0xffffffffffffffff, &(0x7f0000000780), 0x0) geteuid() quotactl(0x0, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000006880)=0xc) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000340)='./file0\x00', 0x0) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:36 executing program 5: epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 03:35:36 executing program 5: epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 03:35:36 executing program 5: epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 03:35:36 executing program 5: epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, &(0x7f0000000600), 0x0) stat(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000340)) quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 03:35:36 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = socket(0x2, 0x200000000080002, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000c80)) connect$netlink(r0, &(0x7f0000000040)=@proc, 0x0) ioprio_get$pid(0x1, r1) 03:35:36 executing program 0: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000e40), 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() openat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f00000006c0)=0x14) fstatfs(0xffffffffffffffff, &(0x7f0000000280)=""/102) fcntl$getown(0xffffffffffffff9c, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@rand_addr}, &(0x7f0000000440)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000840), &(0x7f0000000880)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @empty, @loopback}, &(0x7f0000000900)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001100)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in6=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001480)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000014c0)={@remote, @multicast2}, &(0x7f0000001500)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680), &(0x7f00000016c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000019c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in=@local, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002140)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:35:36 executing program 4: futex(&(0x7f0000000280), 0x4, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000012c0), &(0x7f0000001300)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0x0, &(0x7f0000000080)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) umount2(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r1, r0) 03:35:38 executing program 1: syz_extract_tcp_res$synack(&(0x7f00000008c0), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000940)="c4a1f8ae1b805da0616969692295d320f3410f2c2c9f6f41ff0f1837370f38211ac19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:35:38 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) futex(&(0x7f0000000040), 0x8, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000240), 0x0) mount(&(0x7f00000000c0)=ANY=[], &(0x7f0000000580)='./file0\x00', &(0x7f0000000440)='reiserfs\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200)={@local, @local}, &(0x7f0000000400)=0xc) keyctl$set_reqkey_keyring(0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") memfd_create(&(0x7f00000000c0)='/*/GPL\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast1, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000009c0)={0x0, @empty, @dev}, &(0x7f0000000a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001900)={0x0, @local, @loopback}, &(0x7f0000001940)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001980)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001b40)=0x14) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000280)=""/183) getsockname$packet(0xffffffffffffffff, &(0x7f000000a140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a180)=0x14) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000380)={{}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}, 0x5c) clock_getres(0x0, &(0x7f0000000140)) getsockname$packet(0xffffffffffffffff, &(0x7f000000a1c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a200)=0x14) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000540)={'bridge_slave_0\x00'}) 03:35:38 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfbfffffffffffffa) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0xfe89, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:38 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") dup(0xffffffffffffff9c) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@hci, &(0x7f0000000280)=0x80) accept(0xffffffffffffff9c, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0, &(0x7f0000001540)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @dev, @loopback}, &(0x7f0000001600)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @broadcast}, &(0x7f0000001880)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@dev}, &(0x7f0000001900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001940)={'bridge0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000044c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004500)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000046c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004840)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000004940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004980)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005000)={&(0x7f0000000080), 0xc, &(0x7f0000004fc0)={&(0x7f00000049c0)={0x14}, 0x14}}, 0x0) 03:35:38 executing program 0: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000e40), 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() openat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f00000006c0)=0x14) fstatfs(0xffffffffffffffff, &(0x7f0000000280)=""/102) fcntl$getown(0xffffffffffffff9c, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@rand_addr}, &(0x7f0000000440)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000840), &(0x7f0000000880)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @empty, @loopback}, &(0x7f0000000900)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001100)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in6=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001480)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000014c0)={@remote, @multicast2}, &(0x7f0000001500)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680), &(0x7f00000016c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000019c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in=@local, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002140)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:35:38 executing program 4: getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)) getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000400)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000005c0)={0x2, 0x0, @local}, &(0x7f0000000640)=0x10, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000017c0), 0x0, 0x0, &(0x7f0000000580)={0x0, 0x1c9c380}) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000680)}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) dup(0xffffffffffffffff) geteuid() fstat(0xffffffffffffffff, &(0x7f0000001dc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e40)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002140)={{{@in=@loopback, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000002240)=0xe8) getresgid(&(0x7f0000002280), &(0x7f00000022c0), &(0x7f0000002300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000440)=0xc) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) getgroups(0x0, &(0x7f0000002340)) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000300)="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") fstat(0xffffffffffffffff, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") [ 3350.351378] tmpfs: No value for mount option './file0' 03:35:39 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000240)='./file1\x00'}, 0xfffffc52) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getsockname(0xffffffffffffff9c, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000040)=0x80) 03:35:39 executing program 0: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000e40), 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() openat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f00000006c0)=0x14) fstatfs(0xffffffffffffffff, &(0x7f0000000280)=""/102) fcntl$getown(0xffffffffffffff9c, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@rand_addr}, &(0x7f0000000440)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000840), &(0x7f0000000880)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @empty, @loopback}, &(0x7f0000000900)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001100)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in6=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001480)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000014c0)={@remote, @multicast2}, &(0x7f0000001500)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680), &(0x7f00000016c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000019c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in=@local, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002140)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:35:39 executing program 4: getpid() io_setup(0x0, &(0x7f0000000180)) eventfd2(0x0, 0x0) gettid() dup(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@dev, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000a80)='IPVS\x00') ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000cc0)=""/158) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000a40), 0xc, &(0x7f0000000bc0)={&(0x7f0000000e80)=ANY=[]}}, 0x0) getuid() ioprio_set$pid(0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000c80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@local, @in6=@dev}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in6=@local}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000e40)=0xe8) connect(0xffffffffffffffff, &(0x7f0000000b00)=@can, 0x80) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000f80)) accept4(0xffffffffffffffff, &(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000240)=0x80, 0x0) getegid() fcntl$getown(0xffffffffffffffff, 0x9) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000d80)=ANY=[], 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:39 executing program 5: prctl$void(0x3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000e00)) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/member\x00', 0x2, 0x0) open$dir(&(0x7f00000016c0)='./file0\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001800)='/selinux/enforce\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/status\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001900)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001980)='/selinux/status\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000003d00)={0xa, 0x0, 0x0, @dev}, &(0x7f0000003d40)=0x1c) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000004d80)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000004e00)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000004e80)='/selinux/enforce\x00', 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000004f00)='/selinux/validatetrans\x00', 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000005040)='attr/prev\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000005180), 0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000005200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000005280)) openat(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in=@loopback, @in=@local}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000340)=0xe8) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000000c0)=""/29, &(0x7f0000001000)=0x5) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[]}}, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000600)={0x7}, 0x7) getegid() syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001940), 0x0, &(0x7f0000000380)=ANY=[]) sendmsg(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80), 0x0, &(0x7f0000001a40)=ANY=[]}, 0x0) execve(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000880), &(0x7f0000000980)) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)=""/162, &(0x7f0000000200)=0xa2) openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000680)) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) arch_prctl(0x0, &(0x7f0000000680)) 03:35:40 executing program 0: utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) inotify_init1(0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000400)) vmsplice(0xffffffffffffffff, &(0x7f0000000e40), 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000400)) sched_getattr(0x0, &(0x7f00000005c0), 0x30, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000240)) seccomp(0x0, 0x0, &(0x7f0000000100)) inotify_init() openat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000600), &(0x7f00000006c0)=0x14) fstatfs(0xffffffffffffffff, &(0x7f0000000280)=""/102) fcntl$getown(0xffffffffffffff9c, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@rand_addr}, &(0x7f0000000440)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000800)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000840), &(0x7f0000000880)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @empty, @loopback}, &(0x7f0000000900)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000980)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001100)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001200)={'dummy0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in6=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000001340)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001380)={{{@in6, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001480)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000014c0)={@remote, @multicast2}, &(0x7f0000001500)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001540)={{{@in=@dev, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680), &(0x7f00000016c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000019c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001a00)={@loopback}, &(0x7f0000001a40)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001b40)={{{@in=@local, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002140)={{{@in6=@remote, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000002240)=0xe8) syz_execute_func(&(0x7f0000000300)="428055a06b6969ef69dc00d99069203637c3397c2a060f38211a40a564a741dfe0400f01efe5e57d0f2e1a1a01460f36660fd3600931a3b786e2989f67430f18d3") 03:35:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x4, 0x20000000007ff9, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) 03:35:40 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfbfffffffffffffa) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0xfe89, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:41 executing program 1: syz_extract_tcp_res$synack(&(0x7f00000008c0), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000940)="c4a1f8ae1b805da0616969692295d320f3410f2c2c9f6f41ff0f1837370f38211ac19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:35:41 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x4, 0x20000000007ff9, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) 03:35:41 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") dup(0xffffffffffffff9c) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@hci, &(0x7f0000000280)=0x80) accept(0xffffffffffffff9c, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0, &(0x7f0000001540)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @dev, @loopback}, &(0x7f0000001600)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @broadcast}, &(0x7f0000001880)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@dev}, &(0x7f0000001900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001940)={'bridge0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000044c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004500)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000046c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004840)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000004940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004980)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005000)={&(0x7f0000000080), 0xc, &(0x7f0000004fc0)={&(0x7f00000049c0)={0x14}, 0x14}}, 0x0) 03:35:41 executing program 0: ioprio_get$pid(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) futex(&(0x7f0000001300), 0x0, 0x0, &(0x7f00000012c0), &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) pipe(&(0x7f0000000180)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000001380)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f00000012c0)}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/4096, 0x1000, 0x0, &(0x7f0000001280), 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timerfd_gettime(0xffffffffffffffff, &(0x7f0000001440)) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000001340), 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:35:41 executing program 5: ioprio_get$pid(0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) clock_getres(0x0, &(0x7f0000000040)) pipe(&(0x7f0000000200)) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001540)={0x0, @dev, @local}, &(0x7f0000001580)=0xc) getuid() ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) getgroups(0x0, &(0x7f0000000340)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000a00)) getgid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a40), &(0x7f0000000a80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000b80)) lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c80)) getgroups(0x0, &(0x7f0000000cc0)) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)) 03:35:41 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x4, 0x20000000007ff9, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) 03:35:41 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfbfffffffffffffa) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0xfe89, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:41 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x4, 0x20000000007ff9, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) 03:35:41 executing program 4: ustat(0x0, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpgrp(0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000480)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e00)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000e40)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) syz_open_procfs$namespace(0x0, &(0x7f0000000dc0)='ns/uts\x00') signalfd(0xffffffffffffffff, &(0x7f0000000500), 0x18) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000280)={0x0, @local, 0x0, 0x0, 'sed\x00'}, 0x2c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, 0x5c) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000640)) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) fstat(0xffffffffffffffff, &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000800)={{{@in=@remote, @in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000900)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) fstat(0xffffffffffffffff, &(0x7f00000009c0)) getresuid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@dev, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000c00)=0xe8) geteuid() getgid() lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)) fstat(0xffffffffffffffff, &(0x7f0000000d00)) lsetxattr$system_posix_acl(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000600)='system.posix_acl_default\x00', &(0x7f0000000d80), 0x24, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet6(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.effective_cpus\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000480), 0x0) syz_execute_func(&(0x7f00000002c0)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 03:35:42 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) unshare(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bdc038016dfa19fa762b4242218f8978972bf0817e768cc80000000081b5e5b82b870000002167670fbab204000000ca4b2178dae5e54175450f2e1ac46279db6744c4e1e1666f0771fb0703") socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000005c0), 0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000800)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000600)) rt_sigpending(&(0x7f0000000040), 0x8) pipe2(&(0x7f0000000500), 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000008c0)={{}, 'syz1\x00'}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000700)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000006c0)='/dev/nu}l ', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000780)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000007c0)) getpgid(0x0) getpgid(0x0) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000380)) clock_settime(0x0, &(0x7f0000000140)) accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @loopback}, &(0x7f00000003c0)=0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) 03:35:42 executing program 0: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) fstat(0xffffffffffffff9c, &(0x7f0000000280)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) getgid() stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) setfsgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:35:42 executing program 4: futex(&(0x7f00000000c0), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180), 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) chroot(&(0x7f0000000380)='./file1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a5e400e3e3c13b7c1266460f3a082800b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000003c0)) socket$nl_generic(0x10, 0x3, 0x10) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000400)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x0, 0x0) epoll_create(0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000980)='cgroup.type\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000c80)=ANY=[]) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) openat$random(0xffffffffffffff9c, &(0x7f0000000900)='/dev/urandom\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a40)='threaded\x00', 0xfffffffffffffff5) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) fstat(0xffffffffffffffff, &(0x7f0000000a80)) getresgid(&(0x7f0000000a00), &(0x7f00000008c0), &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getresgid(&(0x7f0000000fc0), &(0x7f0000000cc0), &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getgroups(0x0, &(0x7f0000000e80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@rand_addr, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) geteuid() getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000ec0)) 03:35:43 executing program 1: syz_extract_tcp_res$synack(&(0x7f00000008c0), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x0, 0x0, &(0x7f0000000100)) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000940)="c4a1f8ae1b805da0616969692295d320f3410f2c2c9f6f41ff0f1837370f38211ac19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:35:43 executing program 0: open(&(0x7f0000000500)='./file0\x00', 0x40, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) fcntl$getflags(0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000240)=0x80) getpgrp(0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000440), 0x14) getpgid(0x0) timer_create(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000480), &(0x7f0000000500)}}, &(0x7f0000000600)) timer_getoverrun(0x0) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0x18) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @empty, @multicast1}, &(0x7f00000002c0)=0xc) syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000640), 0xc, &(0x7f0000000700)={&(0x7f00000006c0)=ANY=[]}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000001680)='./file0\x00', &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:43 executing program 3: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") dup(0xffffffffffffff9c) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@hci, &(0x7f0000000280)=0x80) accept(0xffffffffffffff9c, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000001500), 0x0, 0x0, &(0x7f0000001540)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000001580)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000015c0)={0x0, @dev, @loopback}, &(0x7f0000001600)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001640), &(0x7f0000001680)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @broadcast}, &(0x7f0000001880)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000018c0)={@dev}, &(0x7f0000001900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001940)={'bridge0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000001a80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000044c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004500)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004580)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000045c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000046c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004840)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000004940)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004980)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005000)={&(0x7f0000000080), 0xc, &(0x7f0000004fc0)={&(0x7f00000049c0)={0x14}, 0x14}}, 0x0) 03:35:43 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003b00)=""/252, &(0x7f0000003c00)=0xfc) clock_gettime(0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000400)) utimes(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)) openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@remote, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@loopback, @in6=@local}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000010c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000012c0)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001340)) getresuid(&(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) gettid() stat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) getgroups(0x0, &(0x7f00000015c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001600)) geteuid() getgroups(0x0, &(0x7f0000001640)) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000000)=@proc, 0xc, &(0x7f0000000f80), 0x0, &(0x7f0000001680)}, 0x0) prctl$getreaper(0x0, &(0x7f00000005c0)) utime(&(0x7f0000000040)='.\x00', &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="805da06922692295d3208f0978c70dcd9fd19fcec4e2fd8c0d00005d98000f660fe0d570db211ac4c19286d9f28fc9410feefac4e1bdf95bd373e566660fd18f20a60000c400fd034225c4010d64ac1e5d31a3b7c44379dfb9d6adbe90df6d4c6fb667986f7f") getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) clock_gettime(0x0, &(0x7f0000000500)) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000540)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@local}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000580)) rt_sigprocmask(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8) symlink(&(0x7f00000004c0)='./file0\x00', &(0x7f00000006c0)='./file0\x00') ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000680)) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) 03:35:43 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xfffffffc) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0220fef69dc059567c130b267cececb5b5b0f18d7158e7e0c913e64660f3a084d8ef3f3440f1a0ce97e0f6eee04e30f0f750ea0eeba39290f38c4827d20c90f2eee21210feb1a31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) eventfd(0x0) getpid() ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/220) ioctl$void(0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000036c0)={{{@in=@broadcast, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c80)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003d80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc) geteuid() stat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getuid() getresgid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004800)={{{@in, @in6}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000004900)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) getresgid(&(0x7f00000049c0), &(0x7f0000004a00), &(0x7f0000004a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005d40), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) 03:35:44 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003b00)=""/252, &(0x7f0000003c00)=0xfc) clock_gettime(0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000400)) utimes(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)) openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@remote, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@loopback, @in6=@local}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000010c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000012c0)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001340)) getresuid(&(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) gettid() stat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) getgroups(0x0, &(0x7f00000015c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001600)) geteuid() getgroups(0x0, &(0x7f0000001640)) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000000)=@proc, 0xc, &(0x7f0000000f80), 0x0, &(0x7f0000001680)}, 0x0) prctl$getreaper(0x0, &(0x7f00000005c0)) utime(&(0x7f0000000040)='.\x00', &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="805da06922692295d3208f0978c70dcd9fd19fcec4e2fd8c0d00005d98000f660fe0d570db211ac4c19286d9f28fc9410feefac4e1bdf95bd373e566660fd18f20a60000c400fd034225c4010d64ac1e5d31a3b7c44379dfb9d6adbe90df6d4c6fb667986f7f") getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) clock_gettime(0x0, &(0x7f0000000500)) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000540)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@local}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000580)) rt_sigprocmask(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8) symlink(&(0x7f00000004c0)='./file0\x00', &(0x7f00000006c0)='./file0\x00') ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000680)) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) 03:35:44 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000240)=""/220) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="5500000018007f5800fe01b2a4a280930a06000000a84599910000003900090008000c00010000001900150006000000000000dc1338d54400009b84136ef75afb83de44b2ee3b2733c9237f8d621a4559e65517b3", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:44 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfbfffffffffffffa) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @local, @remote}, &(0x7f0000000180)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@broadcast, @rand_addr}, &(0x7f0000000a00)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a80)=0x14, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000ac0)=@can, &(0x7f0000000b40)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0xfe89, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:44 executing program 5: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003b00)=""/252, &(0x7f0000003c00)=0xfc) clock_gettime(0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000400)) utimes(&(0x7f0000000480)='./file0\x00', &(0x7f0000000640)) openat$zero(0xffffffffffffff9c, &(0x7f0000000700)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in=@remote, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in6=@loopback, @in6=@local}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000fc0)={{{@in=@rand_addr, @in6=@remote}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000010c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001100), &(0x7f0000001140)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001180)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000011c0), &(0x7f0000001200)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001300)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000012c0)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) geteuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001340)) getresuid(&(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) gettid() stat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) getgroups(0x0, &(0x7f00000015c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001600)) geteuid() getgroups(0x0, &(0x7f0000001640)) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000000)=@proc, 0xc, &(0x7f0000000f80), 0x0, &(0x7f0000001680)}, 0x0) prctl$getreaper(0x0, &(0x7f00000005c0)) utime(&(0x7f0000000040)='.\x00', &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="805da06922692295d3208f0978c70dcd9fd19fcec4e2fd8c0d00005d98000f660fe0d570db211ac4c19286d9f28fc9410feefac4e1bdf95bd373e566660fd18f20a60000c400fd034225c4010d64ac1e5d31a3b7c44379dfb9d6adbe90df6d4c6fb667986f7f") getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) clock_gettime(0x0, &(0x7f0000000500)) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000540)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000001c0)={@local}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000580)) rt_sigprocmask(0x0, &(0x7f0000000200), &(0x7f0000000240), 0x8) symlink(&(0x7f00000004c0)='./file0\x00', &(0x7f00000006c0)='./file0\x00') ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000680)) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000300)={0x7}, 0x7) [ 3356.035839] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 3356.042448] IPv6: NLM_F_CREATE should be set when creating new route [ 3356.054847] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 3356.069764] ================================================================== [ 3356.077188] BUG: KASAN: use-after-free in ip6_route_mpath_notify+0xc2/0xd0 [ 3356.084215] Read of size 4 at addr ffff8801d6879790 by task syz-executor0/24714 [ 3356.091766] [ 3356.093411] CPU: 0 PID: 24714 Comm: syz-executor0 Not tainted 4.14.70+ #6 [ 3356.100369] Call Trace: [ 3356.102975] dump_stack+0xb9/0x11b [ 3356.106545] print_address_description+0x60/0x22b [ 3356.111412] kasan_report.cold.6+0x11b/0x2dd [ 3356.115835] ? ip6_route_mpath_notify+0xc2/0xd0 [ 3356.120538] ip6_route_mpath_notify+0xc2/0xd0 [ 3356.125064] ip6_route_multipath_add+0xbfc/0x1100 [ 3356.129966] ? ip6_route_mpath_notify+0xd0/0xd0 [ 3356.134649] ? lock_downgrade+0x560/0x560 [ 3356.138823] ? ip6_dst_gc+0x400/0x400 [ 3356.142716] ? rtnetlink_rcv_msg+0x31d/0xb30 [ 3356.147157] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 3356.152133] inet6_rtm_newroute+0xa4/0x110 [ 3356.156388] ? ip6_route_multipath_add+0x1100/0x1100 [ 3356.161504] ? __lock_acquire+0x523/0x4320 [ 3356.165811] ? ip6_route_multipath_add+0x1100/0x1100 [ 3356.170933] rtnetlink_rcv_msg+0x3bb/0xb30 [ 3356.175194] ? rtnl_calcit.isra.12+0x3f0/0x3f0 [ 3356.179799] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 3356.184777] ? check_preemption_disabled+0x34/0x160 [ 3356.189857] ? check_preemption_disabled+0x34/0x160 [ 3356.194905] netlink_rcv_skb+0x130/0x390 [ 3356.198990] ? rtnl_calcit.isra.12+0x3f0/0x3f0 [ 3356.203612] ? netlink_ack+0x980/0x980 [ 3356.207512] ? netlink_deliver_tap+0xa2/0x980 [ 3356.212044] netlink_unicast+0x46d/0x620 [ 3356.216143] ? netlink_sendskb+0x50/0x50 [ 3356.220247] netlink_sendmsg+0x664/0xbe0 [ 3356.224350] ? nlmsg_notify+0x150/0x150 [ 3356.228392] ? nlmsg_notify+0x150/0x150 [ 3356.232392] sock_sendmsg+0xb5/0x100 [ 3356.236147] ___sys_sendmsg+0x741/0x890 [ 3356.240172] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 3356.244950] ? SyS_perf_event_open+0x1c5a/0x27d0 [ 3356.249780] ? __fget+0x204/0x3a0 [ 3356.253248] ? lock_downgrade+0x560/0x560 [ 3356.257497] ? __fget_light+0x192/0x1f0 [ 3356.261516] __sys_sendmsg+0xca/0x170 [ 3356.265367] ? SyS_shutdown+0x1a0/0x1a0 [ 3356.269383] ? SyS_futex+0x1c0/0x2b5 [ 3356.273169] SyS_sendmsg+0x27/0x40 [ 3356.276749] ? __sys_sendmsg+0x170/0x170 [ 3356.280827] do_syscall_64+0x19b/0x4b0 [ 3356.284772] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 3356.289972] RIP: 0033:0x4572d9 [ 3356.293173] RSP: 002b:00007f3ba9a5ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3356.300884] RAX: ffffffffffffffda RBX: 00007f3ba9a5b6d4 RCX: 00000000004572d9 [ 3356.308176] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 [ 3356.315463] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 3356.322728] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 3356.330031] R13: 00000000004d4b60 R14: 00000000004c90ab R15: 0000000000000000 [ 3356.337871] [ 3356.339527] Allocated by task 24714: [ 3356.343259] kasan_kmalloc.part.1+0x4f/0xd0 [ 3356.347618] kmem_cache_alloc+0xe4/0x2b0 [ 3356.351689] dst_alloc+0xb1/0x1a0 [ 3356.355169] __ip6_dst_alloc+0x2f/0x60 [ 3356.359074] ip6_dst_alloc+0x2a/0x1d0 [ 3356.362886] ip6_route_info_create+0x339/0x23d0 [ 3356.367553] ip6_route_multipath_add+0x60b/0x1100 [ 3356.372413] inet6_rtm_newroute+0xa4/0x110 [ 3356.376662] rtnetlink_rcv_msg+0x3bb/0xb30 [ 3356.380909] netlink_rcv_skb+0x130/0x390 [ 3356.384998] netlink_unicast+0x46d/0x620 [ 3356.389131] netlink_sendmsg+0x664/0xbe0 [ 3356.393203] sock_sendmsg+0xb5/0x100 [ 3356.396930] ___sys_sendmsg+0x741/0x890 [ 3356.400917] __sys_sendmsg+0xca/0x170 [ 3356.404733] SyS_sendmsg+0x27/0x40 [ 3356.408289] do_syscall_64+0x19b/0x4b0 [ 3356.412207] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 3356.417401] [ 3356.419040] Freed by task 24714: [ 3356.422421] kasan_slab_free+0xac/0x190 [ 3356.426416] kmem_cache_free+0x12d/0x350 [ 3356.430488] dst_destroy+0x1c7/0x2c0 [ 3356.434222] dst_release_immediate+0x45/0x60 [ 3356.438655] fib6_add+0x18c5/0x2c30 [ 3356.442294] __ip6_ins_rt+0x61/0x80 [ 3356.445946] ip6_route_multipath_add+0xb1c/0x1100 [ 3356.450801] inet6_rtm_newroute+0xa4/0x110 [ 3356.455032] rtnetlink_rcv_msg+0x3bb/0xb30 [ 3356.459284] netlink_rcv_skb+0x130/0x390 [ 3356.463364] netlink_unicast+0x46d/0x620 [ 3356.467438] netlink_sendmsg+0x664/0xbe0 [ 3356.471504] sock_sendmsg+0xb5/0x100 [ 3356.475239] ___sys_sendmsg+0x741/0x890 [ 3356.479225] __sys_sendmsg+0xca/0x170 [ 3356.483038] SyS_sendmsg+0x27/0x40 [ 3356.486589] do_syscall_64+0x19b/0x4b0 [ 3356.490488] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 3356.495700] [ 3356.497328] The buggy address belongs to the object at ffff8801d68796c0 [ 3356.497328] which belongs to the cache ip6_dst_cache of size 384 [ 3356.510179] The buggy address is located 208 bytes inside of [ 3356.510179] 384-byte region [ffff8801d68796c0, ffff8801d6879840) [ 3356.522077] The buggy address belongs to the page: [ 3356.527025] page:ffffea00075a1e00 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 3356.537059] flags: 0x4000000000008100(slab|head) [ 3356.541838] raw: 4000000000008100 0000000000000000 0000000000000000 0000000180120012 [ 3356.549814] raw: 0000000000000000 0000000100000001 ffff8801d5f78a00 0000000000000000 [ 3356.557708] page dumped because: kasan: bad access detected [ 3356.563439] [ 3356.565070] Memory state around the buggy address: [ 3356.570014] ffff8801d6879680: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 3356.577402] ffff8801d6879700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3356.584798] >ffff8801d6879780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3356.592185] ^ [ 3356.596088] ffff8801d6879800: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 3356.603481] ffff8801d6879880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 3356.610870] ================================================================== [ 3356.618247] Disabling lock debugging due to kernel taint [ 3356.628560] Kernel panic - not syncing: panic_on_warn set ... [ 3356.628560] [ 3356.635948] CPU: 0 PID: 24714 Comm: syz-executor0 Tainted: G B 4.14.70+ #6 [ 3356.644087] Call Trace: [ 3356.646696] dump_stack+0xb9/0x11b [ 3356.650257] panic+0x1bf/0x3a4 [ 3356.653463] ? add_taint.cold.4+0x16/0x16 [ 3356.657631] ? ___preempt_schedule+0x16/0x18 [ 3356.662080] kasan_end_report+0x43/0x49 [ 3356.666060] kasan_report.cold.6+0x77/0x2dd [ 3356.670404] ? ip6_route_mpath_notify+0xc2/0xd0 [ 3356.675102] ip6_route_mpath_notify+0xc2/0xd0 [ 3356.679650] ip6_route_multipath_add+0xbfc/0x1100 [ 3356.684531] ? ip6_route_mpath_notify+0xd0/0xd0 [ 3356.689209] ? lock_downgrade+0x560/0x560 [ 3356.693362] ? ip6_dst_gc+0x400/0x400 [ 3356.697243] ? rtnetlink_rcv_msg+0x31d/0xb30 [ 3356.701664] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 3356.706616] inet6_rtm_newroute+0xa4/0x110 [ 3356.710868] ? ip6_route_multipath_add+0x1100/0x1100 [ 3356.716003] ? __lock_acquire+0x523/0x4320 [ 3356.720315] ? ip6_route_multipath_add+0x1100/0x1100 [ 3356.725441] rtnetlink_rcv_msg+0x3bb/0xb30 [ 3356.729702] ? rtnl_calcit.isra.12+0x3f0/0x3f0 [ 3356.734348] ? perf_trace_lock_acquire+0x4d0/0x4d0 [ 3356.739295] ? check_preemption_disabled+0x34/0x160 [ 3356.744354] ? check_preemption_disabled+0x34/0x160 [ 3356.749405] netlink_rcv_skb+0x130/0x390 [ 3356.753481] ? rtnl_calcit.isra.12+0x3f0/0x3f0 [ 3356.758071] ? netlink_ack+0x980/0x980 [ 3356.761987] ? netlink_deliver_tap+0xa2/0x980 [ 3356.766534] netlink_unicast+0x46d/0x620 [ 3356.770640] ? netlink_sendskb+0x50/0x50 [ 3356.774729] netlink_sendmsg+0x664/0xbe0 [ 3356.778823] ? nlmsg_notify+0x150/0x150 [ 3356.782849] ? nlmsg_notify+0x150/0x150 [ 3356.786841] sock_sendmsg+0xb5/0x100 [ 3356.790574] ___sys_sendmsg+0x741/0x890 [ 3356.794573] ? copy_msghdr_from_user+0x3b0/0x3b0 [ 3356.799389] ? SyS_perf_event_open+0x1c5a/0x27d0 [ 3356.804194] ? __fget+0x204/0x3a0 [ 3356.807661] ? lock_downgrade+0x560/0x560 [ 3356.811863] ? __fget_light+0x192/0x1f0 [ 3356.815878] __sys_sendmsg+0xca/0x170 [ 3356.819699] ? SyS_shutdown+0x1a0/0x1a0 [ 3356.823701] ? SyS_futex+0x1c0/0x2b5 [ 3356.827469] SyS_sendmsg+0x27/0x40 [ 3356.831004] ? __sys_sendmsg+0x170/0x170 [ 3356.835064] do_syscall_64+0x19b/0x4b0 03:35:45 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xfffffffc) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x0) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0220fef69dc059567c130b267cececb5b5b0f18d7158e7e0c913e64660f3a084d8ef3f3440f1a0ce97e0f6eee04e30f0f750ea0eeba39290f38c4827d20c90f2eee21210feb1a31a3b7e2989d") seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) eventfd(0x0) getpid() ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=""/220) ioctl$void(0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000036c0)={{{@in=@broadcast, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000037c0)=0xe8) stat(&(0x7f0000003800)='./file0\x00', &(0x7f0000003840)) socket$inet(0x2, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003c80)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000003d80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003dc0), &(0x7f0000003e00)=0xc) geteuid() stat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) getuid() getresgid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004800)={{{@in, @in6}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000004900)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) getresgid(&(0x7f00000049c0), &(0x7f0000004a00), &(0x7f0000004a40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005d40), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) [ 3356.838975] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 3356.844167] RIP: 0033:0x4572d9 [ 3356.847358] RSP: 002b:00007f3ba9a5ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3356.855100] RAX: ffffffffffffffda RBX: 00007f3ba9a5b6d4 RCX: 00000000004572d9 [ 3356.862373] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 [ 3356.869653] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 3356.876927] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 3356.884191] R13: 00000000004d4b60 R14: 00000000004c90ab R15: 0000000000000000 [ 3356.891771] Kernel Offset: 0xce00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 3356.902624] Rebooting in 86400 seconds..