fffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000240)=""/53) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pread64(0xffffffffffffffff, &(0x7f00000002c0)=""/224, 0xe0, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000140)=""/173) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000040)) request_key(&(0x7f0000000480)='syzkaller\x00', &(0x7f00000004c0), &(0x7f0000000580)='*\x00', 0xffffffffffffffff) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000680)='user\x00', &(0x7f00000006c0), &(0x7f0000000800), 0x0, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000700), &(0x7f00000008c0)=""/247, 0xf7, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000004100)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000500)) seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) getrandom(&(0x7f0000000200)=""/104, 0x4e394ef9d9c54cd6, 0x3) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000001c0)={"000000000000000000000000e5ffffff", @dev}) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f0000000180)) personality(0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$ion(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ion\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000003c0)) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") add_key(&(0x7f0000000500)='logon\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0x0) futex(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000400), &(0x7f0000000440)=0x40) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f00000002c0)={0x7}, 0x7) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000300)='tls\x00', 0x4) 03:35:21 executing program 3: clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x3f5) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000780)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000500)=""/135, &(0x7f00000005c0)=0x87) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000006980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) mlock(&(0x7f0000d8b000/0x2000)=nil, 0x2000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000d8d000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in6}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700), 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000340)=""/50, 0x32, 0x0, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10) chown(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000006880)=""/193) recvmmsg(0xffffffffffffffff, &(0x7f0000002500), 0x0, 0x0, &(0x7f0000002540)) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) openat(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000980)={0x7}, 0x7) mknod(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0) getgroups(0x0, &(0x7f0000000040)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0), 0x0) ftruncate(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:23 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/87, 0x57) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @link_local, [], {@ipv4={0x8864, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:35:23 executing program 1: pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000006c0)) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f0000000380), 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000640)) getrandom(&(0x7f00000002c0)=""/148, 0xfffffffffffffe20, 0x3) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) clock_gettime(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000340)}}, &(0x7f0000000400)) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066418955a4e088d557207c2a06c46129ef950000002140a564a70d157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000600)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000680)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000700)) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) 03:35:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, "003a497b29846fa9f0c1d87aa176560b097b7fd854b903968751ca62d9f3852ae706b47de37c7a4a47a7941314c43d55e508e8a8132f51854f49518ccb9b620f", "d74869076583d0cede37e27ebf6446f11263cdd6c12d010744d14ba2cea411ff9c4991281349ee5f2739b31c65a34f25c2c019e73eeb368df4c031b71c07aa4e", "b18e74c0c77555f54687baf5b82f2d0112a4c84b3b9409e47714b4d0ea119b69"}) 03:35:24 executing program 1: msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @loopback}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@local, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000000ac0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000b40)=0x14) clock_gettime(0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f0000000400)) recvmmsg(0xffffffffffffffff, &(0x7f0000004d00), 0x4000000000002cd, 0x0, &(0x7f0000000300)={0x77359400}) getpeername$packet(0xffffffffffffffff, &(0x7f0000004f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004f40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004f80)={0x0, @multicast1}, &(0x7f0000004fc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000006c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006cc0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:27 executing program 2: memfd_create(&(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000180)='/proc/self/net/pfkey\x00') rt_sigpending(&(0x7f0000000080), 0x8) times(&(0x7f0000000040)) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_execute_func(&(0x7f0000000240)="428055a02ec402ed07faf4e37d0fe1fb6920375137c339392a5a8e38211a1aa564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:35:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000040)="071f080000000000970600c6fe76cff3e26def23000200000811000013", 0x1d) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000001000)=""/4096, &(0x7f00000001c0)=0x1000) 03:35:27 executing program 0: clock_nanosleep(0x7, 0x1, &(0x7f0000000340), &(0x7f0000000280)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getpgid(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@known='user.syz\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) epoll_pwait(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, &(0x7f00000000c0), 0x8) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000740)={{}, 'syz0\x00'}) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000080)) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:35:27 executing program 5: getrlimit(0xfffffffffffffffc, &(0x7f0000000840)) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") mount(&(0x7f0000000580)=ANY=[], &(0x7f0000000540)='./file0\x00', &(0x7f0000000140)='sockfs\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') syz_execute_func(&(0x7f00000007c0)="c4025d9e4a0041df5bff40decc8fc8088f32993e66420fefa949450000c4821d3b43e08f6978d28e89bc00008fe8c4a24f83018f8940023556e88a17c4826d464b00") 03:35:27 executing program 1: mmap(&(0x7f000090c000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)=ANY=[]) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@hci, &(0x7f0000000200)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000340), &(0x7f0000000380)=0xc) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) capget(&(0x7f00000001c0), &(0x7f0000000240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@multicast2, @in=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0x12) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:28 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x6) seccomp(0x0, 0x0, &(0x7f0000000100)) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000300)=0x8cfacae6c7830ed0) syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], &(0x7f0000000480)) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sysinfo(&(0x7f0000000ec0)=""/245) accept4(0xffffffffffffff9c, &(0x7f0000000240)=@can, &(0x7f00000002c0)=0x80, 0x0) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") 03:35:29 executing program 1: ustat(0x1, &(0x7f00000009c0)) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000380), &(0x7f0000000940), 0x0, 0xfffffffffffffffb) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, 0x0, &(0x7f0000000440)=""/73, 0xffffffffffffff6f) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) unshare(0x0) add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180), &(0x7f00000007c0), 0x0, 0xfffffffffffffffd) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f00000001c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) keyctl$join(0x1, &(0x7f0000000540)) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000640), 0x0, 0x0, &(0x7f00000006c0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000200), 0x4) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5d3c5562b2b0f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:35:30 executing program 3: pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') request_key(&(0x7f0000000780)='dns_resolver\x00', &(0x7f00000007c0), &(0x7f0000000800)='\x00', 0x0) request_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000280), &(0x7f00000002c0)='-&\x00', 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='memory.current\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000c00)='/dev/rtc#\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000c40)='tasks\x00', 0x2, 0x0) syz_open_dev$loop(&(0x7f0000000c80)='/dev/loop#\x00', 0x0, 0x0) dup(0xffffffffffffffff) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000009c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000500)}}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000540)}}}) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000880), &(0x7f0000000580)=0xc) getpgid(0xffffffffffffffff) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @rand_addr}, &(0x7f0000000380)=0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000640)='cpuacct.stat\x00'}, 0x30) fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000005c0)) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000a80)="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") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000440)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) connect$packet(0xffffffffffffffff, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) getitimer(0x0, &(0x7f0000000300)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b767e2989f7f") 03:35:30 executing program 4: symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000040)={0x43}, 0x43) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f00000002c0)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sched_getscheduler(0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000200)={0x7}, 0x7) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) getpgid(0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000440)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000500), 0x4) umount2(&(0x7f0000000140)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 03:35:30 executing program 1: signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000300)=""/33) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000480), 0x10) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) recvmmsg(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0, &(0x7f0000001bc0)={0x77359400}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000019c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400), &(0x7f0000000440), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000440)='threaded\x00', 0x9) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0), 0xc, &(0x7f0000000340)={&(0x7f0000000800)=ANY=[]}}, 0x0) umount2(&(0x7f0000000240)='./file0\x00', 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") write$selinux_user(0xffffffffffffffff, &(0x7f00000007c0)={'system_u:object_r:gpg_agent_exec_t:s0', 0x20, 'user_u\x00'}, 0x2d) syz_execute_func(&(0x7f0000000200)="428055a02b6969ef69dc00d9ce41ff0fba37370f38211ac4c19086d9f28fc9410feef24e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:30 executing program 2: clock_gettime(0xd9012a20d797d59d, &(0x7f0000000300)) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000380)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001800)='IPVS\x00') syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@multicast2, @broadcast}, &(0x7f0000000400)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@remote}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'gretap0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001740)={@rand_addr, @multicast2}, &(0x7f0000001780)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002b80)={@multicast2, @dev}, &(0x7f0000002bc0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002c40)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c80)={{{@in=@local, @in=@rand_addr}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000002d80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002dc0)={{{@in=@local, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000002ec0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002f00)={@ipv4}, &(0x7f0000002f40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003080)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000030c0)={@local, @broadcast}, &(0x7f0000003100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000003140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003180)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000031c0), &(0x7f0000003200)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000003240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003280)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f00000033c0)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000003400)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003480)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000034c0)={@remote, @remote}, &(0x7f0000003500)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003600)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000003700)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003740)={0x0, @multicast1, @dev}, &(0x7f0000003780)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004c80)={@local}, &(0x7f0000004cc0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000004dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004e00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004e80)={{{@in6, @in=@multicast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@dev}}, &(0x7f0000004f80)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000005100)={&(0x7f0000004fc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000050c0)}, 0x0) clock_gettime(0x0, &(0x7f0000005c80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:31 executing program 1: socket$key(0x2, 0x3, 0x2) shutdown(0xffffffffffffffff, 0x0) gettid() capget(&(0x7f0000000080), &(0x7f0000000140)) timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211aaaa50f486c360d410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) fstat(0xffffffffffffffff, &(0x7f0000000480)) getgid() stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in=@remote}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in6=@mcast2, @in6}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000024c0)=0xe8) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)) getegid() geteuid() 03:35:31 executing program 1: nanosleep(&(0x7f0000000040), 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000280)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x0, 0x0) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004cc0)={{{@in=@rand_addr, @in=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000f80)=0xe8) getgroups(0x0, &(0x7f0000000fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001000)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002bc0), &(0x7f0000002c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000200)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000002cc0)='#\\\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f0000002d40), &(0x7f0000002d80), &(0x7f0000002dc0)) getgid() getpgid(0xffffffffffffffff) geteuid() getgroups(0x0, &(0x7f0000002e00)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002e80), &(0x7f0000002ec0)=0xc) getegid() getpid() lstat(&(0x7f0000002f00)='./file0\x00', &(0x7f0000002f40)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003480), &(0x7f00000034c0)=0xc) getresuid(&(0x7f0000003500), &(0x7f0000003540), &(0x7f0000003580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003640)) getuid() stat(&(0x7f0000003680)='./file0\x00', &(0x7f00000036c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003740)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003780), &(0x7f00000037c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003840)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000003800)='rxrpc\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003880)={{{@in6=@local, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000003980)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a80), &(0x7f0000003ac0)=0xc) getgroups(0x0, &(0x7f0000003b00)) gettid() stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004040)) lstat(&(0x7f0000004080)='./file0\x00', &(0x7f00000040c0)) getgroups(0x0, &(0x7f0000004140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004180)) getresuid(&(0x7f00000041c0), &(0x7f0000004200), &(0x7f0000004240)) stat(&(0x7f0000004280)='./file0\x00', &(0x7f00000042c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004940), 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:35:32 executing program 5: quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) write$FUSE_POLL(0xffffffffffffffff, &(0x7f00000001c0)={0x18}, 0x18) getpgid(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000440)=0xe8) syz_execute_func(&(0x7f00000012c0)="42805da0c60fef69dc0f01eece73fe19fae89e1166450f6b361af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe2a5e400fb7e0703") 03:35:33 executing program 0: lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getgroups(0x0, &(0x7f00000002c0)) io_setup(0x0, &(0x7f0000000800)) getgid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) getgid() getgroups(0x0, &(0x7f0000000400)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) getpgrp(0x0) eventfd(0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/rtc0\x00', 0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000001140), 0x8, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001480)) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001cc0)='/selinux/load\x00', 0x2, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001d00)='/selinux/status\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000001d40)='cgroup.clone_children\x00', 0x2, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000001d80)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000001dc0)=0x1c) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) timerfd_create(0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000001c0)) openat$ion(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/ion\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001e80)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000001ec0)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/ashmem\x00', 0x0, 0x0) getpid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001f40)='cpuset.memory_pressure\x00', 0x0, 0x0) accept(0xffffffffffffff9c, &(0x7f0000001f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000002000)=0x80) openat$ion(0xffffffffffffff9c, &(0x7f0000002040)='/dev/ion\x00', 0x0, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000002140)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000002180)='/selinux/checkreqprot\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2, &(0x7f00000021c0)='\\\x00'}, 0x30) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000003680)='/selinux/enforce\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000036c0)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000003700)='/dev/ashmem\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000003740)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000003780)='/selinux/status\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) socket$packet(0x11, 0x0, 0x300) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000003880)) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000038c0)='/selinux/user\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0c26969ef69dc00d9906920375137c339392a8e0f38211a0fdcd664a741fae0400f01efe5e5417545460f44352f7d00001a1a01460f01ee31a3b786e298262e64f30f2b05090000003f") 03:35:33 executing program 1: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) seccomp(0x0, 0x0, &(0x7f0000000100)) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000980)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000800)={0x0, @dev, @multicast2}, &(0x7f0000000840)=0xc) accept$packet(0xffffffffffffff9c, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000a80)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000000ac0)={@mcast2}, &(0x7f0000000b00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000c40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d80)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000000dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000e40)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000fc0)={@mcast2}, &(0x7f0000001000)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000010c0)={@broadcast}, &(0x7f0000001100)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001140)={{{@in=@local, @in=@remote}}, {{}, 0x0, @in=@local}}, &(0x7f0000001240)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001dc0)={@rand_addr, @multicast2}, &(0x7f0000001e00)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e40)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001f40)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001f80)={0x0, @empty, @broadcast}, &(0x7f0000001fc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f00000006c0), 0xc, &(0x7f0000002500)={&(0x7f0000002000)={0x14}, 0x14}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) clone(0x0, &(0x7f00000004c0), &(0x7f0000000480), &(0x7f00000000c0), &(0x7f00000002c0)) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000640)={'yam0\x00', {0x2, 0x0, @remote}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") uname(&(0x7f0000000540)=""/120) iopl(0x0) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000001c0), 0x0) ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000006c0)=ANY=[]) clock_gettime(0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getitimer(0x0, &(0x7f0000000400)) 03:35:33 executing program 1: io_setup(0xda5, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) fstat(0xffffffffffffff9c, &(0x7f00000002c0)) getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) fstat(0xffffffffffffffff, &(0x7f0000000400)) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000540)) getgroups(0x0, &(0x7f00000005c0)) timerfd_create(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000780)) getuid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000680)) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000840)={{{@in=@multicast2, @in6=@ipv4={[], [], @dev}}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000540)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a40)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@local, @in6}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001000)={@local}, &(0x7f0000001040)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001140)={{{@in=@rand_addr, @in=@local}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@loopback}}, &(0x7f0000001240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001680)={{{@in=@local, @in=@local}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f0000001400)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001980)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000019c0)={0x0, @multicast1, @loopback}, &(0x7f0000001a00)=0xc) accept(0xffffffffffffffff, &(0x7f0000001ac0)=@xdp, &(0x7f0000001b40)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001bc0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001c40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001c80)={0x0, @multicast1, @rand_addr}, &(0x7f0000001cc0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001d00)={'veth0_to_bond\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001d40)={{{@in, @in6}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001e40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001e80)={{{@in6, @in6=@local}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000001f80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002000)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000002100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002200)={@ipv4}, &(0x7f0000002240)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002280)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002380)={{{@in=@multicast1, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000002480)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000024c0)={@rand_addr, @local}, &(0x7f0000002500)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002940), &(0x7f0000002980)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000029c0)={@remote}, &(0x7f0000002a00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002a40)={0x0, @remote, @broadcast}, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002a80)={'bcsf0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000002ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002b00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b40)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000002c40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c80)={{{@in6=@remote, @in=@local}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000002d80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004380)={@loopback, @remote}, &(0x7f00000043c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in=@loopback, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000004540)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005040)={&(0x7f00000001c0), 0xc, &(0x7f0000005000)={&(0x7f0000004580)=ANY=[]}}, 0x0) getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) 03:35:34 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0xfffffffffffffffc, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) rt_sigtimedwait(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0), 0xfffffe9c) request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f00000002c0), &(0x7f0000000380)='vboxnet1:\x00', 0xfffffffffffffffa) keyctl$get_keyring_id(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000180)='\x00'}, 0x10) creat(&(0x7f0000000140)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000800)='team0\x00', 0xffffffffffffffff}, 0x5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000880)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'osx.', 'team0\x00'}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") 03:35:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x200002, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000680)=0xc) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) openat$random(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/urandom\x00', 0x0, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@ipv4, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000000d80)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000ec0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000010c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001100)={{{@in=@local, @in6}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000001200)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001240)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000012c0)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000013c0)=0xe8) getgroups(0x0, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001700)) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)) fstat(0xffffffffffffffff, &(0x7f0000001800)) getpid() stat(&(0x7f0000001880)='./file1\x00', &(0x7f00000018c0)) getgroups(0x0, &(0x7f0000001940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001980), &(0x7f00000019c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001a00)={{{@in=@dev, @in6=@ipv4}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001b00)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001b40)) getuid() getgid() open$dir(&(0x7f0000001b80)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)) getresuid(&(0x7f0000001ec0), &(0x7f0000001f00), &(0x7f0000001f40)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001f80)) getresgid(&(0x7f00000001c0), &(0x7f00000000c0), &(0x7f0000000140)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42f98055a08e8e69ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e5430f0fa3be000000bf5d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:35 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:35 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000240)='bdev\x00', 0xffffffffffffffff}, 0x30) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={"00000000000000000000000005000207", 0x4203}) r1 = dup(r0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000000)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'ifb0\x00'}) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'L-', 0x6}, 0x28, 0x0) seccomp(0x0, 0x0, &(0x7f0000000440)={0x0, &(0x7f0000000400)}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000300), 0x0) add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) finit_module(0xffffffffffffffff, &(0x7f00000003c0)='**GPLkeyringppp0#\x00', 0x0) syz_execute_func(&(0x7f0000000640)="42805da0c60fef69dc0f01eecef3406cd5f4fa780f61127c366766460f382862008fa9309bc4c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56bc44158c6dd000febbd0900000067660f38db6c5e42c4e1fc1199d89b000001f564ac1e5d31a3b744dbe2") 03:35:35 executing program 5: setxattr$trusted_overlay_redirect(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0\x00', 0x8, 0x0) chdir(&(0x7f0000000200)='./file0\x00') lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000540)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:35:35 executing program 4: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x33, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 03:35:35 executing program 2: lookup_dcookie(0x0, &(0x7f0000000180)=""/237, 0x7959125a33421ae9) wait4(0x0, &(0x7f0000000140), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@remote, @in6=@local}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @broadcast}, &(0x7f00000004c0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000500)={0x0, @dev, @remote}, &(0x7f0000000540)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000005c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000006c0)={@mcast1}, &(0x7f0000000700)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000740)={'veth1_to_bond\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@dev, @in6}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000880)=0xe8) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f00000009c0)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a40)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b40)={{{@in=@local, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000c40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000cc0)={@local}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000ec0)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f40)=0x14) getsockname(0xffffffffffffff9c, &(0x7f0000001040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000010c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002480)={'team0\x00'}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:35 executing program 1: getrlimit(0x0, &(0x7f0000000280)) clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000080)='syz1\x00') write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000340)={0x43}, 0x43) pselect6(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280)={&(0x7f0000000240), 0x8}) clock_gettime(0x0, &(0x7f00000005c0)) futex(&(0x7f0000000300), 0x0, 0x0, &(0x7f0000000700), &(0x7f0000000740), 0x0) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000040)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getgid() 03:35:36 executing program 1: ioprio_set$uid(0x2, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x34f, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0, 0x1000, &(0x7f0000000240), &(0x7f0000000900)=""/4096}, 0x28) prctl$setname(0xf, &(0x7f0000000040)='@/eth0vmnet0cgroupmd5sum2\x00') time(&(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000540)=0x14) epoll_pwait(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000380), 0x8) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") accept(0xffffffffffffffff, &(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@loopback}}}, &(0x7f00000001c0)=0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0x3bd) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000740)={0x0, @loopback, @local}, &(0x7f0000000780)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000800)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'ip6_vti0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000980)={@dev, @rand_addr}, &(0x7f00000009c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40), &(0x7f0000000b80)=0x14, 0x0) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_names\x00') openat(0xffffffffffffffff, &(0x7f0000000400)='./file0/file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000007c0)) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000180)={0x7}, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000bc0)={@empty, @dev}, &(0x7f0000000c00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'syzkaller0\x00'}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000840)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x88) 03:35:40 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:35:40 executing program 2: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140), &(0x7f0000000180)="f2", 0x1, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000000c0)='\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000300)={0x8, "b06173bb99dfa56a98d2396457a0d23906798d3344556c4f4b55366679f82dbd9cdd453b5abe7cfa484eaf9a029ddfb64c3eab7296399ee04ce49d8b2da2b555d3ebd3f5ca1b8ac7fa67d354e3403391224f381ae5d98a66ad7285cc0d23ae3193917acafde2d9cf1547b51cdf2ccb585c8fdfa91b72ccffad4f2a9acb6325c3f7076a285683b35b16c74522563499579aa1e0a89ef0080c23fd9c2d37f378982c6b7172c7fb21da71652dadd505f030fc7dfd0db4efd18b08ac1f56a77857680174e8568bbded9a968798da466749b1e6d4c45af2604a3ba82d3aa5cde54333b52e9e091fa2f84441bc562b668c96bc5572d1f9799bb66df0ee86d274025280762385df6201dac3c134e7546bdb17894763c9df26316f304a9021fde9b6a174cde898b69ed658ee10fb97b45dfb7dbdd84d9e83615eba6f1e1b1425fe02e09382969e838d85345842b056e266613d0728f1c93c14c0341daec911b9910bc9f96cee87f610490f72a48b2526efe5a4b4653a7ab08bc9a540e636f26b8e4e330e994eb62bdec576f42d18cd98550515a8ab71c01148e17c928ea1f151f3e8b1297aaef423413e72f58d35334430591a7cd68c7bb6d19ab5fc106471475bf7f80345065eb3b68d68b21ace8961a7db5cb3b43d034f0a50ee256cfb91d21311e897765acfc59e554dd916af81a7c97db99b714d2f2b40170e054549b39f3778eb9f6cd348e6320a0244447c1ba9acdf1d51bd5e020b979e68e3d38ce6d90e299e68ad77c954edd226c1c287ebd6d38c9b5f3f4d052b305e047d970c30f440efeb517b038b1aadfde87609674c7cbd62372f0fe626ebeaf0ff8a38e143eccee5d6ed689bad621cba2bccefe82e68596444d072fa21cb4b7c995bc7daf19f1f1ca34192ab75d46f08c3ed8e96d1f5086e05804d45c04c647da5c2d8cba3fb3b0b5ae9947e678b2dd2a877fa62f5d491267ad478b3c8d9fccba4206812024068de8bae0e51577898aa69ca43c68150742650559225af7925838d1602456854c5cc9e54ba1f655ad2beab05ecb21ee807ac69823957036eb6a76271d7b3ddb99a4215e507e2c0f72661f1806b73f789a528a8e71d69e0fdd504950bf064d3c32104481fc5a6b58ec98539ff6a6b662d4058da843d72d1bcb4380dcfeefd2cb8bc16bf508dde5724cd29a2453aee389680d7ac40c34dfc04b6646bd8658f3ac07f0fe2ad5294c589ecc4b4c1be2036afc8e66e1e50317ad3938bea755d10e5181efad912b80bb1c0a2a36baa575f8f4f9a9cd97b8e302ed7332978e208a3bbd0f7e8028717ecc84ed298d6e7732eae095d791382db5dbb7c4b61ef57410b1b87e05b1fe7c200a9d8230c3e49ab8e39f1260d92f0e88802e2413dea50013631109fa835e9a449508e3f9b77bb2ed0debe5adb754ac57b30ae3b4f513aa6de0312d1b8d5e4302d7b44ac299df0a70af70d12b5bfec7182989192dc5d01e5dcba52819e2beeee7b1c978b3eb6b0d97ac57a9e7eb7fc5cc9f5bfdeb8aba5fafc3e7a3f28ef51df0c3870110212247f70a4f63675b1319ebd09973bdc2ee88eee8e6f0e6b7618140b342f0fb9a8b0548139e6a09d60a00b55a05d2754a8874ea5f944d8664e1c951a8668a6ba4dacfc48e7b8a4b959185fbd36e21ea62103b78753cf3e86ed557e1a4bdbd41ba08149552078322f17116e3dd7b33fd2230ec9b61b7dee33667b1e88c0d836762edf3f6f7375eb242b92e1e3ccf555bd6805239d2d590dc94e259c5e5d71eb042a79e6d32b397fa428822f6595b50be45e4f86d1cb1acab5c409c92d065d80e4c74b9c9cb395384b8c4e97f907780f51490502a94b60eb9d63cd3dc9fb313cfca7a1c8672c2f79d1f3bd139df5411a1854b9f542cf8b463dd2721bc224c87e8abd985819e54626a8ab29a9e27aee177473ead75c293e394b5ab9135fb430f92d5d995b86773397b7539382f4090933a4c4991427445aeae8bc2646c0e369e3605313f3b5d23a9cb2eb8c8f67d63aa0b3893ba92901a4cf640ae7f7b7e2040bc1eb5cf1ef1ed3a6ebc7b0a27b1e014040f406118416a08814dd6aa634c6c378f393e12eff65e4635d51b7ad985c546420ec8bf025889270c537e49d92a46e99c167bf64b2ecc7f5e744dc55ca35919b63e7331ca2a32322822c3f6ef8b3684ee1cbd17e35da2893dd38a06684a951bf703b0856b82393f058324f4e41d22b844d9af5943c9b716d7e8e4b5640ac3c6e264ca8d7f978cbd7aebb9807642b34dd92d38289d3012a66bc8797ed4c706018cfc463765b2bb6fefc8ddb5624272617b5641bf4cf693cf3f838cc3bacf0470c572e427516d9f9d1c2a5410f9e8c9448ea549e14daa2e3d8a2e419f03c80c2218e064e10322f12628c04cb98c7d8e83db3d808ac4d1f37198195a9a4004e1ee139aa7a4a7f5f2d3e1d04dbbcd6aa2dbae9f148874a6bb63de9b4e9bf4692ee18217be28628433d4bb27ae7d13301020eb1cde9d4d8dd2c4ccadd97a2d475c215bbc41e47b8822b4de33cc3f7a0a60aad3be430893d1bd5523a939a7c45abf33a71f095879ab2c95bfa595628265de0c8ed4f7b78ca2d0fb81ceb14331b3727e8ed53bd93c195a83abba32aaab3b1974199a0327b0233f770ff30eafd9d1937183ce25a5454edcbdf2bc550c5f3aaf144df1b61ff2af164028b4a25d55e9c377861ba67c4402f55da56c5769536dd2c43b3f8f7aaa24652cac580b8df04e0a6ad9da349e1e365e920aa1400db1404ff4cde265e67f57856ba0eb5adad12b5f05cb19db064d68c5983743aa9085831484b3ed30600c2b2f7e491b186d0c6e0ded27f830570cca4569ef90ffbaaa3b0754e6b356e975962e0f0363e094fa86ea2b697ec7712d67cac9157b1d54e84d980840117b50d658b28161494df3e15a2e64ba142f6b59fdda3e930a43acf430824e6ce531e94ed7e1627adb106ef857ac101b57940a0005d9dd4ef0089a7d78ad0e94fadb8707f898b907e98f9f5e0454cfa28ccbdd51f25567a9c3e9ee2b1056819e40d61902e7c81a818cb2cd56f45696180e7721923bde2bd35db9966a789218512574ea360b19cd369a21bb641734c538f5cd0f0226e1d00865d871d0b38be39811f2c1de20dcba5a842014c4c741ccf11429dba92ab775248ea0cd1d539cda5c1cc927fce127f51bb417555f99f3d9f7a81481dd9bb84b98ad3c0255c5b29c9261d97df12af7df8831300372b65d10355ba45a0c66bc46df502d6d02891ab558e9f99c5320e952d260055d59ca2baba2f7c62356d92ca461bf050b6e9435dd03ceac94020561a8d9e1a64806131214561b0da46d82ac9c8a195823af0878872cf9e4e187d2da968b286a35e1c9a9f8bad6ef470f2aad66ecd428f9a9beaf288df5956faf0f478900d37bbe48ea440da097995fb42f8d87b026ef452324f0d57b1fb603c473375fea8490eb49dcf710fd8d0ea103908eb5777934ccf67d9b5e5f3c2d8d32319df1d31705b24364251fa1cdc74810badedf66af807f5f63db8fcea7242c7abf6ae039d6dbf6a6e0cb12e602891d2af23edd51731d7ac3326e3f198712beb632c864a3a43b3c5050208c66c70fe7b44fbd0280d84ee143c2ab1b02ab4213a191c26d323a2b0e98618ed5df33e046f518b910a67d009ae06e5eef88d357c24e864775cf7a1c01797c815dc53425b96e576f4149d9ac40731d6808c7ad04833a8b81b0006abe52ba9923d205f46b124952abe001987d427379c1fa0a3637b59fc1bc1eb02ac80a43c823694cad50ff5d894dea9354806feedb28b0f2d280d827a591f862c095e79cdf351c2d1f19b619ae50865ff32f0e63f6eb8c1bc91406999c4996aef70892c14b4d4deb2b098f7f879937b5bcf530d2a9f5c36087d6ca2fe8c5605c297ce773a609e39e35c8c65858db4e3de36d467f49091c485aeccf1844bf6567833e818208079734d69614d59802c0ca7c260befec33c8ae6998ee08910a1786a0fd03a8959fac3f3c86eb4e6906f6ebd2f74852353bdaf2985bed282d0dd4d4bdd26024e44856879d55356e06c1e0230b8c61c72c0913cf9eb216e45626f78279dd1f06c03dad546bf710f9f6d251002dd7b0dbc55e8ccc0f80be4322a58e5016e5d71caf1564e1c0598e8ecc761dcdb53636ae89953727e94162f4bf2217dc399c868300ef8ecc0076fe5ad4321c01caf434f01566520611f0a198e434dbaeca2900c80def9662fb0023314703366ac7f0b2417073db33708ab88eb710aa1b317b4e2b16a7965af9d78ae9bd7075874b6ea00c748b850344499d399fa8c5c2cedeb7236659f6a9470bf05fa6fa36eeac4034ff2d5666d35253c8567389d5e7d03e7970150bd58665a1a998e77070c717204c7784155e436358f19ab94930cdb7c9ae291d4811dd7ba576df56fa6f47f228a592831351ddaa5c1b68366b65945e37dcc1f7b86fdadf8666669158b7cfc16b10e1b1eb3048968fa8a2cc54148b3b2c70125aab2db0bc4675c70c434bfb50a1c6457b8eae384992a804d6423587e9c6afa32fe76a6b5da2afba64007be1788a0fa3fb09a73bd083b189ec944286c01daede23f76c46712449f434d446642c0cac7a99f7f9dc9ab0aff4ed65c36132d2447a74d9b088946fe831dca1a3fe9ba16a1953d7aa68dbd20f308ba5d3461d32fb7f4180b8a42cfa533b9a1608b8e1dd32ae0ef275bfbd5da58c993da93df73f11704c6b3191ece1d35fffbb4f92ed11012365d86c6d6d2fd1825e57cc9a33fe93f28177b3941c29b14a75f777243b0e38e72239907cca3acdcb9ecc61e28673baadaa2a482863cf21a37b0735e1ba6a27c8f5b056c973bd8f0770a8df58bcd513a6715e2a7cdf81ce11a9b34fe782737ea55e259dc60c997e92d4d12809ddb0d6ba8dc2164b9d7f00aed6b66541045b8ddbac43b7091d648705e15b92e5ce9780dfd1986e1332e18da86c4da4706e70e9743ca0b36bd73f677ca9b3245d5a03294b800ed9ca26194f7c6afb3388976980ce1fac01a9da0764a763f47ded9b22246af8d2a3aaefca3ce37297b7ae4a522300e5a396caa4de93377065c4c2e1e2a5309da55560cfe09eec9fdf98712ea98091f427aeb22c95609a60a9d6811e2b3c27dafc335634e8198ef2d3ef17f8d40b188e167af7dda96340f33bba45f2f221af4128d2d788ba8a64b5c5ab0e32bb72d80400fdaa8c3c15a53d50ef062033da3cc4db46bc7b1d567677e17fe689094c97cbdf918dc5c11c775aea8107a120ac9bfd6003196b8378c58d34291a22835359cdefafb097a8d7371a4c4ac378e11d75841c2e968f83db286e992b5450df7932bb11e104a2db844a0c70d8df9cde93441f5a516fb24cf673cff5be850f205894da3e47136cce2e15bea0831d4f470ca0b58a075f4c89b1c8a7dfd5e6679ac61f74a01e743ea1442987b52e77bbf930470851fa07fefec2c81bb6d9f0df8e6d3f288771e0217fd57c525330cb536323f56bb4b0432204d74d3c1498722288348fff75651f3844289524d62a0c4af4534ca936ba97f220e4fd66fbf4ac1325903091b6d890352e4723926f03a23d443bcf434592da8c6f8c15508cf3cc17215740152138a3dc4c9fb4de447ba3e52cfbde0f7f63adb7771b927ed21ebc05ea17dec58deccd44394f0791ff16af8ded30fd741618137fc95c524e503e052d90aa1335dae592541e8b4bc14df1d8296485fa80d58eb08660ed3e0d5c585b431b73e179bd106e0920efdb44e7ff9c45d5dad666f079d4927d7d04cc13e19768cd1", 0x1000}, 0x1006) 03:35:40 executing program 5: getitimer(0x0, &(0x7f0000000180)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0)=0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000c80)=ANY=[], &(0x7f0000000700)='./file0\x00', &(0x7f0000000ac0)='selinuxfs\x00', 0x0, &(0x7f0000000900)="73656375726974792e6361706162696c69747900fcd8f483d9d89b835c43d8c5edeb8151d4c92939fd59253ca4949e7a3cf91a3309e3d2d851a6274d1346cd8be473e78e9b6f1a871cd950a10315a70b2b15a8fb47634b9255e805ad3d9c7e02230c90a13fffbaa7ebd6db7fce700c3e8f07453edf88e5c05e695045410e3ad7db63e37f0a25bdbf92a1b2fe1312fb5e5ff6424e981131154a2639ba6392254070e0c3cdd789aab65445b99c9bad90bd41befe1a1c8e639d1050c6f62097d89e2042") seccomp(0x0, 0x0, &(0x7f0000000100)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) pipe(&(0x7f0000000740)) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000006c0)) unshare(0x0) getpid() openat$dir(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffff9c, 0x10, &(0x7f00000002c0)={&(0x7f0000000180)=""/86, 0x56, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0xffffffffffffffa6) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000000c0)) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) socket$packet(0x11, 0x0, 0x300) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000400), 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 03:35:41 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, 0x10) keyctl$session_to_parent(0x12) inotify_init() sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') chdir(&(0x7f0000000200)='./file0\x00') lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)) getegid() openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000400)) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_matches\x00') write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000480)={0x18}, 0x18) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@abs, 0x6e) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000bc0)="428055a02e0fa326f436c7847fef41ef41375137c339390f8a4a892040a564a7c4820901baf9ffffffc4c2118e8abb96000037e17875e1c40195580ce32e1a012666410ffa9ecdb50000a2d00000000000000026542ae9d26406f16406f1092500003f") seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2$9p(&(0x7f0000000040), 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)={@ipv4={[], [], @local}}, &(0x7f0000000600)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@dev, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000740)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000780)={@multicast2, @broadcast}, &(0x7f00000007c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000840)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@dev, @in6}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000980)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'bcsf0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000b80)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000075c0)={0x0, @broadcast, @rand_addr}, &(0x7f0000007600)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000007680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000076c0)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000007700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007740)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007780)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000007880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000078c0)={0x0, @loopback, @rand_addr}, &(0x7f0000007900)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007940)={@multicast2, @multicast2}, &(0x7f0000007980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000079c0)={{{@in, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000007ac0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007b00), &(0x7f0000007b40)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007b80)={@dev}, &(0x7f0000007bc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000007c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000007c40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007cc0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007d00)={0x0, @local, @dev}, &(0x7f0000007d40)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000008840)={&(0x7f0000000000), 0xc, &(0x7f0000008800)={&(0x7f0000007d80)={0x14}, 0x14}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @loopback, @rand_addr}, &(0x7f00000001c0)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x0) 03:35:42 executing program 3: setgroups(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) getrandom(&(0x7f0000000340)=""/104, 0x68, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) pipe(&(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) getuid() getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f00000010c0)=0xe8) stat(&(0x7f0000001100)='./file1\x00', &(0x7f0000001140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000011c0)) stat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) stat(&(0x7f00000012c0)='./file1\x00', &(0x7f0000001300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001780), &(0x7f00000017c0)=0xc) getresuid(&(0x7f0000001800), &(0x7f0000001840), &(0x7f0000001880)) getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000019c0)={{{@in6, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@mcast1, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000001c40)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001d00)) getresuid(&(0x7f0000001d40), &(0x7f0000001d80), &(0x7f0000001dc0)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001e00)) stat(&(0x7f0000001e40)='./file1\x00', &(0x7f0000001e80)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:35:42 executing program 1: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='cpuacct.usage_sys\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) getsockname(0xffffffffffffffff, &(0x7f0000000680)=@can, &(0x7f0000000700)=0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=@raw, &(0x7f0000000640)='syzkaller\x00'}, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xd7) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) syz_execute_func(&(0x7f0000000340)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:42 executing program 2: keyctl$set_reqkey_keyring(0x4, 0x3) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/173, &(0x7f00000000c0)=0xad) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200), 0x88) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/210) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000440)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000d40)=ANY=[], 0x0) prctl$setname(0x10, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)={0x0, @multicast2, @multicast1}, &(0x7f0000000fc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000027c0)={{{@in=@multicast1, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002a40)={0x0, @multicast1}, &(0x7f0000002a80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ac0)={{{@in=@dev, @in=@rand_addr}}}, &(0x7f0000002bc0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002c00)={@loopback}, &(0x7f0000002c40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002d00)={'sit0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d40)={{{@in=@multicast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002e40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f40)={{{@in6=@ipv4={[], [], @local}, @in=@local}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003040)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003080)={{{@in=@broadcast, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in6, @in6}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003440)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000034c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000003500), &(0x7f0000003540)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003580)={@remote}, &(0x7f00000035c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000003700)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003840)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003880)={@broadcast, @multicast1}, &(0x7f00000038c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003940)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000003980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000039c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a00)={@ipv4={[], [], @loopback}}, &(0x7f0000003a40)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000000840), 0x0, 0x0, &(0x7f0000004940)) accept$packet(0xffffffffffffffff, &(0x7f0000004980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000049c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004a00)={@loopback, @dev}, &(0x7f0000004a40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000005580)={&(0x7f0000000580), 0xc, &(0x7f0000005540)={&(0x7f0000004a80)={0x14}, 0x14}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f0000000240)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000006c0)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") accept4(0xffffffffffffffff, &(0x7f00000003c0)=@rc, &(0x7f0000000280)=0x80, 0x0) syz_execute_func(&(0x7f0000000980)="428055a0ec6969ef69dc00d9f7a500000000c841ff0fc4c17c2b6c0c12f3460f2ddc2b8c40a56409c3e50fdee675c421f96086532b000031a22a24a00f2e1a1a31a3b786e2989f") 03:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) alarm(0x0) open$dir(&(0x7f0000001740)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 03:35:42 executing program 1: mount(&(0x7f0000000480)=@loop={'/dev/loop'}, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={{0x77359400}}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) quotactl(0x0, &(0x7f00000001c0)='.\x00', 0x0, &(0x7f0000000340)) seccomp(0x0, 0x0, &(0x7f0000000100)) read$eventfd(0xffffffffffffffff, &(0x7f0000000400), 0x2ea) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'ah\x00'}, &(0x7f0000000440)=0x1e) fstatfs(0xffffffffffffffff, &(0x7f0000000600)=""/4096) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:43 executing program 1: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000440)) pipe(&(0x7f0000000240)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) sync() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000400)=0xe8) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getgroups(0x0, &(0x7f00000006c0)) getresgid(&(0x7f0000000700), &(0x7f00000007c0), &(0x7f0000000800)) fstat(0xffffffffffffffff, &(0x7f0000000840)) getgroups(0x0, &(0x7f00000008c0)) setxattr$system_posix_acl(&(0x7f0000000200)='./file1\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000980)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/116, 0x74) memfd_create(&(0x7f0000000240)='em0+eth1\'trusted(\x00', 0x0) pipe2(&(0x7f0000000340), 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000006c0)) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='IPVS\x00', 0xffffffffffffff9c}, 0x10) getpid() seccomp(0x0, 0x0, &(0x7f0000000100)) 03:35:43 executing program 5: syslog(0x0, &(0x7f0000000080)=""/110, 0x6e) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) time(&(0x7f0000000640)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='eth0cgroup(\x00'}, 0x10) fcntl$getown(0xffffffffffffffff, 0x9) pipe(&(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000200)}) sendmmsg(0xffffffffffffffff, &(0x7f00000038c0), 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000580), 0x10) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/200) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:35:44 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="080000000000000000000080028000007a0a00fffffffffd630148"], &(0x7f0000000480)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x4, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000200)='syzkaller\x00', 0x84000001, 0x3342, &(0x7f0000000300)=""/187}, 0x48) 03:35:46 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:35:46 executing program 1: mlock2(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0x7, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) rt_sigpending(&(0x7f0000000080), 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f00000002c0)=""/241) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000500)) seccomp(0x0, 0x0, &(0x7f0000000100)) getpgid(0x0) syz_execute_func(&(0x7f0000000240)="428055a02ec402ed07faf4e37d0fe1fb6920375137c339392a5a8e38211a1aa564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:35:46 executing program 4: r0 = socket$inet6(0xa, 0x80000000000001, 0x0) clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000000)={'ip_vti0\x00', @ifru_mtu=0x705000}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000140)=""/185) 03:35:47 executing program 1: clock_getres(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:50 executing program 3: wait4(0x0, &(0x7f0000000140), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) set_tid_address(&(0x7f00000001c0)) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setrlimit(0x0, &(0x7f0000000200)) keyctl$set_reqkey_keyring(0x4, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x0, 0x0) pipe(&(0x7f0000000580)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f00000008c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000880)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000440)={'syz_tun\x00', {0x2, 0x0, @broadcast}}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/mls\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000740)=""/167, &(0x7f0000000180)=0xa7) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:50 executing program 1: keyctl$join(0x1, &(0x7f0000000080)) prctl$intptr(0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$key(0xf, 0x3, 0x2) syz_execute_func(&(0x7f0000000480)="42805da06a0f460f46dc0f01ee263a208600d7c0c176cb66662626660f69b2000000002900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff701c3f04d6adbe90dfe2987e") write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f00000000c0)={0x29}, 0x29) 03:35:50 executing program 2: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/173, &(0x7f00000000c0)=0xad) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200), 0x88) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f00000002c0)=""/210) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000440)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000d40)=ANY=[], 0x0) prctl$setname(0x10, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000f40)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)={0x0, @multicast2, @multicast1}, &(0x7f0000000fc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000010c0)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000027c0)={{{@in=@multicast1, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f00000028c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002a40)={0x0, @multicast1}, &(0x7f0000002a80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ac0)={{{@in=@dev, @in=@rand_addr}}}, &(0x7f0000002bc0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002c00)={@loopback}, &(0x7f0000002c40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002cc0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002d00)={'sit0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002d40)={{{@in=@multicast2, @in=@dev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000002e40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002f40)={{{@in6=@ipv4={[], [], @local}, @in=@local}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003040)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003080)={{{@in=@broadcast, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003340)={{{@in6, @in6}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003440)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a08f6969ef69dc00d9c4e17911466fc841ff0f1837c4c3397c2a060f38211a40a52e67660f383cc5e50f50e67579c421a22a04a00f2e1a1a0126460fe4e731a3b786e2989f7f") 03:35:50 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x1, &(0x7f00000000c0)) 03:35:50 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:35:50 executing program 5: creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000200)=0x80) seccomp(0x8000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0336969ef69dc364180c7e041a30f7f7f3766460f38285230c4637905a70d000000c135c935c97d197a0779fb8f2860ceeba679cbff43d0e1460f0da11b000000010d64ac1e5d31a314b706e242d08039c52a7d987b7f") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001bc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c00)={{{@in6=@remote}}, {{@in=@multicast2}}}, &(0x7f0000001d00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d40), &(0x7f0000001d80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)) getgroups(0x0, &(0x7f0000001e80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001f00)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000001ec0)='vboxnet0\x00'}, 0x30) getuid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000022c0)) fstat(0xffffffffffffffff, &(0x7f0000002300)) fstat(0xffffffffffffffff, &(0x7f0000002380)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002400)={{{@in=@multicast1, @in6}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000002500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002540)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000025c0)={{{@in6}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000026c0)=0xe8) getresgid(&(0x7f0000002700), &(0x7f0000002740), &(0x7f0000002780)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d40)={{{@in6=@loopback, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f00000027c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003e40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005380), &(0x7f00000053c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005400)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000054c0)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000005480)='ð0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005500)={{{@in=@local, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000005600)=0xe8) getgroups(0x0, &(0x7f0000005640)) accept4$unix(0xffffffffffffffff, &(0x7f0000005680)=@abs, &(0x7f0000005700)=0x6e, 0x0) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005b00), &(0x7f0000005780)=0xc) lstat(&(0x7f00000057c0)='./file0\x00', &(0x7f0000005800)) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000059c0), 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) getresuid(&(0x7f0000002800), &(0x7f0000002840), &(0x7f0000002880)) fstat(0xffffffffffffffff, &(0x7f00000028c0)) syz_execute_func(&(0x7f0000000680)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:35:50 executing program 1: getrusage(0x0, &(0x7f0000000700)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x2f7, &(0x7f0000000240)}) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000002c0)='\x00', 0xffffffffffffffff}, 0x30) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000003c0)='\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getpgrp(0x0) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d00)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getgid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000e00)) fstat(0xffffffffffffffff, &(0x7f0000000e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000fc0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000010c0)=0xe8) getgroups(0x0, &(0x7f0000000240)) eventfd2(0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001300)={{{@in=@local, @in6=@loopback}}, {{@in=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001400)=0xe8) getresgid(&(0x7f0000001440), &(0x7f0000001480), &(0x7f00000014c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f0000007400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xfffffffffffffd22) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001c00)={{{@in=@loopback, @in6}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001d00)=0xe8) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e00)) geteuid() getgid() getpid() stat(&(0x7f0000007240)='./file0\x00', &(0x7f00000071c0)) getresgid(&(0x7f0000003540), &(0x7f0000003580), &(0x7f00000035c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003600), &(0x7f0000003640)=0xc) getuid() fstat(0xffffffffffffffff, &(0x7f0000003680)) getpgid(0x0) stat(&(0x7f0000003a00)='./file0\x00', &(0x7f0000004c00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004d00)) stat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) stat(&(0x7f0000004e00)='./file0\x00', &(0x7f0000004e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004ec0)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005040), &(0x7f0000005080)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005380)) lstat(&(0x7f00000050c0)='./file0\x00', &(0x7f0000005400)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006c80)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000006d80)=0xe8) getegid() gettid() socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000006ec0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006f80), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f00)={{{@in=@dev, @in6}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6}}, &(0x7f00000007c0)=0xe8) lstat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) 03:35:52 executing program 1: munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0d30fef69dc0f01ee660f3a608600088041cb913591913d06c481c954882accf7fe0a00000f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:52 executing program 4: mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setrlimit(0x0, &(0x7f0000000400)) select(0x40, &(0x7f0000000240), &(0x7f0000000280)={0x1}, &(0x7f0000000340), &(0x7f0000000380)={0x77359400}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f0000000500), 0x0, 0xfffffffffffffffd) memfd_create(&(0x7f0000000300)='selinuxem0vboxnet1\x00', 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f00000003c0)) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000002c0), 0xc) keyctl$setperm(0x12, 0x0, 0x0) memfd_create(&(0x7f0000000040)='posix_acl_access}%\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fsync(0xffffffffffffffff) syz_execute_func(&(0x7f0000000540)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@dev, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000780)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0)={@dev, @multicast1}, &(0x7f0000000800)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000035c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003600)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000003780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000037c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003800)={@broadcast, @dev}, &(0x7f0000003840)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000009a00)={0x0, @local, @broadcast}, &(0x7f0000009a40)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000009a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000009ac0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009b40)={@loopback}, &(0x7f0000009b80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009bc0)={{{@in=@multicast1, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000009cc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000010000), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010240)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000010340)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010380)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000010480)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000010900)={&(0x7f0000000600), 0xc, &(0x7f00000108c0)={&(0x7f00000104c0)={0x14}, 0x14}}, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='devtmpfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000440)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) bind$unix(0xffffffffffffffff, &(0x7f00000009c0)=@abs, 0x6e) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) getpid() ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @multicast1}, &(0x7f0000000080)=0xc) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) getrusage(0x0, &(0x7f0000000240)) 03:35:52 executing program 1: munlockall() futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4(0xffffffffffffffff, &(0x7f0000000600)=@alg, &(0x7f0000000680)=0x80, 0x0) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") clock_nanosleep(0xfffffffffffffffc, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000500)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000080), 0x0) getitimer(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:35:53 executing program 1: memfd_create(&(0x7f0000000400)='vlan0\x00', 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000440), &(0x7f00000004c0)=0x6e, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffa) openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bond0\x00'}) syz_open_dev$rtc(&(0x7f00000002c0)='/dev/rtc#\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) syz_execute_func(&(0x7f0000000580)="42805da0ad5252ef84dc3df83df8eece67f3406e660c54823dc3c381768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:35:53 executing program 1: getpriority(0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)) socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300), &(0x7f0000000340)='\x00', 0xfffffffffffffff8) keyctl$revoke(0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) epoll_create(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000008e00)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140), &(0x7f0000000180), 0x0, 0x0) getresuid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in6=@dev, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000e00)) getresuid(&(0x7f0000000e80), &(0x7f0000000ec0), &(0x7f0000000f00)) lstat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000010c0)={{{@in6=@ipv4={[], [], @local}}}, {{@in=@loopback}}}, &(0x7f00000011c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001b40)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000001c40)=0xe8) stat(&(0x7f0000001c80)='./file0\x00', &(0x7f0000001cc0)) getresuid(&(0x7f0000001d40), &(0x7f0000001d80), &(0x7f0000001dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e00), &(0x7f0000001e40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001e80)={{{@in=@loopback, @in6=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001f80)=0xe8) lstat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004400)={{{@in6=@dev, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000004500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), &(0x7f0000004580)=0xc) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) lstat(&(0x7f0000004680)='./file0\x00', &(0x7f00000046c0)) getuid() stat(&(0x7f0000004740)='./file0\x00', &(0x7f0000004780)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioprio_get$pid(0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:58 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0), &(0x7f0000000200), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000004f40)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004f80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) getpgrp(0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000500)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@local, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) fstat(0xffffffffffffffff, &(0x7f00000007c0)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000000dc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001280)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001240)='\x00', 0xffffffffffffffff}, 0x30) geteuid() stat(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001380)={{{@in6=@local, @in=@local}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001480)=0xe8) lstat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in=@rand_addr, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001680)=0xe8) lstat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001780)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000001880)=0xe8) getgroups(0x0, &(0x7f00000018c0)) geteuid() getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004b80)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000004c80)=0xe8) stat(&(0x7f0000004cc0)='./file0\x00', &(0x7f0000004d00)) getresuid(&(0x7f0000004d80), &(0x7f0000004dc0), &(0x7f0000004e00)) getgid() 03:35:58 executing program 1: setitimer(0x0, &(0x7f0000000380)={{}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f0000000200)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='timers\x00') ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000240)={{0x2, 0x0, @multicast1}, {0x0, @dev}, 0x0, {0x2, 0x0, @rand_addr}, 'bpq0\x00'}) socket$inet_icmp_raw(0x2, 0x3, 0x1) seccomp(0x0, 0x0, &(0x7f0000000100)) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f00000000c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000002c0)={0x0, &(0x7f00000001c0)}) memfd_create(&(0x7f0000000380)='asymmetrig\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ftruncate(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000140)="428055a06b6969ef69dc00d99069203637c3397c2aaf200f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000540)={0x0, @dev, @broadcast}, &(0x7f0000000580)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000005c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in=@multicast1, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@broadcast, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f00000008c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@broadcast, @multicast1}, &(0x7f0000000980)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a00)=0x14) clock_gettime(0x0, &(0x7f0000008000)) recvmmsg(0xffffffffffffffff, &(0x7f0000007d80), 0x0, 0x0, &(0x7f0000008040)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008080)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008180)={@mcast2}, &(0x7f00000081c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000008200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008240)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009840)={@remote}, &(0x7f0000009880)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000a500), 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f000000a580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000a5c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000a600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a640)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a680)={{{@in6=@loopback, @in=@dev}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f000000a780)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000a880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000a8c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a900)={{{@in, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f000000aa00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000aa40)={{{@in=@broadcast}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f000000ab40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f000000ab80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000abc0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000ac00)={{{@in=@local, @in6=@remote}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f000000ad00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000aec0)={0x0, @loopback}, &(0x7f000000af00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000b000)={{{@in6=@loopback, @in6=@local}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f000000b100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000b300)={@remote}, &(0x7f000000b340)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bcc0)={{{@in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f000000bdc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000be00)={{{@in6, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f000000bf00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000c600)={'gretap0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000c680)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000c740)={{{@in6=@dev, @in=@remote}}, {{}, 0x0, @in6=@remote}}, &(0x7f000000c840)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000c880), &(0x7f000000c8c0)=0x14) accept(0xffffffffffffffff, &(0x7f000000c900)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000c980)=0x80) 03:35:58 executing program 2: clock_gettime(0x0, &(0x7f0000000940)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000340)) bind$netlink(0xffffffffffffffff, &(0x7f0000000580), 0xc) sendto$inet(0xffffffffffffffff, &(0x7f0000a88f88), 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @local}, @in=@local}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000640)=0xe8) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000280)=""/77, 0x4d, 0x0, &(0x7f0000000500)=@ll, 0x80) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000200)='y\x00', 0x2, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000005c0)) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000600)=ANY=[], 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f00000003c0)) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0be6969ef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989f7f") setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000380), 0x10) futex(&(0x7f00000009c0), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000980), 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000002c0)=""/165) signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) 03:35:58 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x6) syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000002c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000100)={0x60000008}) epoll_wait(r2, &(0x7f00000005c0)=[{}], 0x123b, 0x1ff) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:35:58 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) socket$inet6(0xa, 0x801, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) ioctl$KDDISABIO(r2, 0x4b37) rt_sigqueueinfo(0x0, 0x1a, &(0x7f00000000c0)={0x34, 0x0, 0x3, 0xcb}) ioctl(r1, 0x8912, &(0x7f0000000040)="295ed277a4200100360070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x14, 0x0, 0xb, 0x2, 0x0, 0x70bd2b, 0x25dfdbfd}, 0x10}}, 0xc040) ioctl$VT_ACTIVATE(r2, 0x5606, 0x20) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x7001, &(0x7f00000000c0)) getuid() ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r4, r5, r6) 03:35:58 executing program 4: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000018c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) epoll_create1(0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001a00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002b00)="5b2d70726f637d656d31b800"}, 0x30) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002cc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") timerfd_create(0x0, 0x0) eventfd(0x0) syz_execute_func(&(0x7f0000000200)="1c8e805da0616969692295d3200f01ee5a41ff0f1837370f38211ac4c4c3996b6205d8c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b755b498985fc3") 03:35:59 executing program 1: listxattr(&(0x7f00000001c0)='.\x00', &(0x7f00000002c0)=""/4096, 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000012c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@dev}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000013c0)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast1}}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000015c0)={{{@in=@multicast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000016c0)={{{@in=@local}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f00000017c0)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000001800)) geteuid() stat(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000001ac0)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001a40)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000001a80)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000001940)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004380)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000001a00)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001980)={@loopback}, &(0x7f00000019c0)=0x14) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f00000043c0)='syz1\x00') 03:36:00 executing program 1: keyctl$set_reqkey_keyring(0x11, 0xfffffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000240)='bdev\x00', 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000200), &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)) 03:36:01 executing program 1: pipe(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") keyctl$set_reqkey_keyring(0xe, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000001140)=@nfc, 0x80) 03:36:02 executing program 1: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000003c0), 0x4) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000200)=""/165) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400), 0x4) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000380)) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f00000003c0)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000005c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000740)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000780)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) gettid() fstat(0xffffffffffffffff, &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b00)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000ac0)='/selinux/avc/hash_stats\x00'}, 0x30) getuid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40), &(0x7f0000000f80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000fc0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in6=@ipv4={[], [], @local}, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000001100)=0xe8) getpgid(0x0) stat(&(0x7f0000001140)='./file0\x00', &(0x7f0000001180)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001400)) fstat(0xffffffffffffffff, &(0x7f0000001440)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000014c0)) getresuid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000015c0)) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d80)) getresuid(&(0x7f0000001dc0), &(0x7f0000001e00), &(0x7f0000001e40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001ec0), &(0x7f0000001f00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000024c0)) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002500)) fstat(0xffffffffffffffff, &(0x7f0000002540)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f00000025c0), &(0x7f0000002600), &(0x7f0000002640)) getpid() geteuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002680)) fstat(0xffffffffffffffff, &(0x7f00000026c0)) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:36:02 executing program 0: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe6}]}) syz_execute_func(&(0x7f0000000200)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:36:03 executing program 2: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) memfd_create(&(0x7f0000000140)='#cpusetem0\x00', 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0), 0x0) eventfd2(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000003440), 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000540), 0x10) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, &(0x7f0000000640), 0x8) inotify_init() fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000005c0)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000500)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000540)) eventfd(0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000740)=0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000780)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='fdinfo\x00') syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x14}, 0x14}}, 0x0) socket$inet_udplite(0xa, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)) dup(0xffffffffffffffff) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) syz_execute_func(&(0x7f0000000140)="805da076ca24a3a37d71ef695c0f010dcececbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bbc4816166647902") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)="ed00000076") open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'veth0_to_team\x00'}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @dev}, &(0x7f00000002c0)=0x1c) openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={@multicast1}, 0xc) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1}, &(0x7f0000000200)=0x20) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@local, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000340)=0xffffff06) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 03:36:07 executing program 1: clock_gettime(0x806, &(0x7f0000000240)) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0), 0x0, 0x0, &(0x7f00000040c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000080)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000004100)) futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000580)={{0x2, 0x0, @multicast1}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @dev}, 'nr0\x00'}) getgid() getgroups(0x0, &(0x7f00000003c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) fstat(0xffffffffffffffff, &(0x7f0000000500)) setresgid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:36:07 executing program 5: futex(&(0x7f00000000c0), 0xfffffffffffffffd, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) creat(&(0x7f0000000080)='./file0\x00', 0x0) geteuid() openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000040)={0x14}, 0x14) umount2(&(0x7f00000008c0)='./file0/file0\x00', 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$packet(0x11, 0x0, 0x300) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000200)={0xf}, 0xf) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0xa) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0), &(0x7f0000000600)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000680)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000700)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000007c0)={0x0, @rand_addr, @rand_addr}, &(0x7f0000000800)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840), &(0x7f0000000880)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'vcan0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@local, @in6}}, {{@in=@loopback}}}, &(0x7f0000000b80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003180), &(0x7f00000031c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003200)={@local, @broadcast}, &(0x7f0000003240)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003280)={@broadcast, @local}, &(0x7f00000032c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004980)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000004a80)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004b80)={0x0, @multicast1, @local}, &(0x7f0000004bc0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004c00)={@ipv4={[], [], @remote}}, &(0x7f0000004c40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004d40)={0x0, @multicast1, @rand_addr}, &(0x7f0000004d80)=0xc) getpeername(0xffffffffffffffff, &(0x7f0000004f80)=@can, &(0x7f0000005000)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005040)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005080)={'gre0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005100)={{{@in6=@mcast2, @in6}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000005200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005240)={{{@in6=@mcast1, @in=@dev}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000005340)=0xfffffffffffffe22) 03:36:07 executing program 4: clock_settime(0x0, &(0x7f0000000040)={0x77359400}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) sched_setaffinity(0x0, 0x8, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @local}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000900)={@dev}, &(0x7f0000000940)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000980)={@loopback, @remote}, &(0x7f00000009c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@local}}}, &(0x7f0000000f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f40)={{{@in6=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001040)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001140)={{{@in6=@loopback, @in6}}, {{@in6=@mcast2}}}, &(0x7f0000001240)=0xe8) accept4(0xffffffffffffffff, &(0x7f0000001280)=@xdp, &(0x7f0000001300)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000023c0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006fc0)={@ipv4={[], [], @loopback}}, &(0x7f0000007000)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007040)={@empty, @multicast1}, &(0x7f0000007080)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000070c0)={'bcsf0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000071c0)={'team_slave_1\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000007680)={&(0x7f0000000540), 0xc, &(0x7f0000007640)={&(0x7f0000007200)={0x14}, 0x14}}, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000500)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) timer_getoverrun(0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000340)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f00000004c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) prlimit64(0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000380), 0x0) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000300)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="428055a07e6969ef69dc00d9c421a05d2fc4e135dc2ff2420f58410da2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01efe5d70fecec1a1ac4a159e92420c4ea899ba05200000045dff34590") ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000580)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000180)) 03:36:08 executing program 1: dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe3}]}) sendto$inet(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, 0x10) clock_gettime(0x0, &(0x7f0000000040)) setitimer(0x0, &(0x7f0000000080)={{}, {0x0, 0x2710}}, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket$packet(0x11, 0x0, 0x300) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6, @local}, 0x10) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 03:36:08 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001240)={0x0, @multicast1, @dev}, &(0x7f0000001280)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in=@broadcast, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000014c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001500)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001540)={{{@in=@remote, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000001640)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000003600), 0x0, 0x0, &(0x7f0000003800)={0x77359400}) getsockname$packet(0xffffffffffffffff, &(0x7f0000003840), &(0x7f0000003880)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000038c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003900)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003940)={@local, @dev}, &(0x7f0000003980)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000039c0)={'ifb0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003a00)={@mcast1}, &(0x7f0000003a40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003a80)={0x0, @multicast2, @loopback}, &(0x7f0000003ac0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b00)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000003c00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003c40)={{{@in6=@local, @in=@dev}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000003d40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000003fc0)=0xffffffffffffff0d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004000)={{{@in, @in6}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000004100)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000042c0)={@loopback, @rand_addr}, &(0x7f0000004300)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000004380), &(0x7f00000043c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000004400)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000004440)={@dev}, &(0x7f0000004480)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000044c0)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@remote}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f00000045c0)=0xe8) recvmmsg(0xffffffffffffff9c, &(0x7f0000005a00), 0x0, 0x0, &(0x7f0000005a80)={0x77359400}) accept$packet(0xffffffffffffff9c, &(0x7f0000005ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005b00)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005c80)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@dev}}}, &(0x7f0000005d80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005dc0)={{{@in, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000005ec0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000005f00)={'vlan0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005f40)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000a240)={@remote, @broadcast}, &(0x7f000000a280)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a2c0)={{{@in=@remote, @in6=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f000000a3c0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000af80)={&(0x7f0000000300), 0xc, &(0x7f000000af40)={&(0x7f0000005f80)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000340)) pipe(&(0x7f00000005c0)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000280), 0x4) chroot(&(0x7f0000000040)='./file0\x00') clock_gettime(0x0, &(0x7f00000007c0)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mprotect(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) chroot(&(0x7f0000000380)='./file1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) accept4$unix(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000180)=0x6e, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 03:36:08 executing program 2: unshare(0xfffffffbfffffffb) eventfd(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000200)={'ip6gretap0\x00', {0x2, 0x0, @remote}}) socket$inet_udplite(0xa, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000380), &(0x7f00000003c0)=0x8) clock_gettime(0x0, &(0x7f00000000c0)) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000140)={{0x2, 0x0, @local}, {0x0, @link_local}, 0x0, {0x2, 0x0, @remote}, 'lo\x00'}) fcntl$getflags(0xffffffffffffffff, 0x0) inotify_init1(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000500)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000340), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") clock_gettime(0x0, &(0x7f0000000240)) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f00000004c0)) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)="ed00000076") dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)) 03:33:20 executing program 1: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x1, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000580)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000005c0)) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) getegid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000640)=ANY=[], 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) syz_open_procfs(0x0, &(0x7f00000001c0)='syscall\x00') write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000002540)) getgroups(0x0, &(0x7f00000025c0)) geteuid() getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002600)={{{@in6=@mcast1, @in6=@local}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000002700)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002b40)) 03:33:20 executing program 1: clock_gettime(0xfffffffffffffffd, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000240)) io_setup(0x0, &(0x7f00000002c0)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000002dc0)) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001c00)='/selinux/mls\x00', 0x0, 0x0) creat(&(0x7f0000001d40)='./file0\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f00000003c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000006c0)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000840)={0x0, @loopback, @loopback}, &(0x7f0000000880)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000b80)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={"6966623000000000000000bf5e06af00"}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in6=@local, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f0000000d00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000d80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000dc0)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000f40)={@mcast2}, &(0x7f0000000f80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000fc0)={{{@in=@multicast1, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f00000010c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001140)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @local, @broadcast}, &(0x7f00000011c0)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000001200)=@xdp, &(0x7f0000001280)=0x80) accept4$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001300)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001340)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000001440)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001480)={'yam0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003e00)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000002d40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002d80)={@dev}, &(0x7f0000003f00)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000003f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003f80)=0x14, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000004700)={&(0x7f0000000100), 0xc, &(0x7f00000046c0)={&(0x7f0000002340)=ANY=[]}}, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001dc0)='/selinux/enforce\x00', 0x0, 0x0) pipe2(&(0x7f0000001ec0), 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001f40)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000002140)) syz_open_procfs$namespace(0x0, &(0x7f00000021c0)='ns/net\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000002240)='/dev/ppp\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000002300)='/dev/rtc0\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000002380)) getrusage(0x0, &(0x7f0000000940)) 03:33:21 executing program 5: prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) getpgrp(0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000180)={'NETMAP\x00'}, &(0x7f00000001c0)=0x1e) accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000200)={0x0, @aes256}) futex(&(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280), &(0x7f00000002c0), 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:21 executing program 0: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000700)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x3, &(0x7f0000000900), &(0x7f0000000980)='syzkaller\x00', 0x0, 0x51, &(0x7f00000009c0)=""/81}, 0x48) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000ac0)) fstat(0xffffffffffffff9c, &(0x7f0000000b00)) lstat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) socket$inet(0x2, 0x0, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000c40)='/selinux/user\x00', 0x2, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000c80)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000cc0)=0x1c) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000d00)) perf_event_open$cgroup(&(0x7f0000000d80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000d40)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000e00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e80)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000e40)='/proc/self/net/pfkey\x00', 0xffffffffffffffff}, 0x30) accept(0xffffffffffffffff, &(0x7f0000000ec0)=@nl, &(0x7f0000000f40)=0x80) pipe2$9p(&(0x7f0000000f80), 0x0) epoll_create1(0x0) accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000fc0)) socket$inet_tcp(0x2, 0x1, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000001000)='/dev/urandom\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000010c0)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001240)={{{@in6, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@local}}, &(0x7f0000001340)=0xe8) getresgid(&(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)) getpid() getuid() stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001c80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001cc0)={{{@in=@remote, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001dc0)=0xe8) getgid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001e00)='./file0\x00'}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001e80), &(0x7f0000001ec0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@dev, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000002000)=0xe8) getgid() fcntl$getown(0xffffffffffffff9c, 0x9) getuid() getgroups(0x0, &(0x7f0000002040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000020c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002080)='cgroup[\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140)) getegid() openat$rtc(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/rtc0\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) accept$unix(0xffffffffffffff9c, &(0x7f0000002200), &(0x7f0000002280)=0x6e) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000022c0)='/selinux/enforce\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002300)='./cgroup/syz1\x00', 0x200002, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000002340)='/dev/ion\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000002740)=@abs, &(0x7f00000027c0)=0x6e, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002800)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000028c0), 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001680)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0fa2b292b29ef69dc00d9ce41ff0fba37370f38211a440f00e1c4a119149300000000410feef24e2179fbe5e536f2ec0f2e1ac4010d64ac1e5d31a3b706e2989f257f") 03:33:22 executing program 1: time(&(0x7f0000000340)) select(0x40, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) inotify_init() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpu.stat\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000880)) getresuid(&(0x7f00000008c0), &(0x7f0000000b40), &(0x7f0000000b80)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000000d00)) getegid() getpid() lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000011c0)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}}}, &(0x7f00000012c0)=0xe8) getgid() getpgid(0x0) stat(&(0x7f0000003000)='.\x00', &(0x7f0000003040)) getgroups(0x0, &(0x7f00000030c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003540)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000003500)='team0\x00'}, 0x30) stat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)) getegid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003640)={{{@in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000003740)=0xe8) lstat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003840)={{{@in6=@loopback, @in=@remote}}, {{}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000003940)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003980)) getresuid(&(0x7f00000039c0), &(0x7f0000003a00), &(0x7f0000003a40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:33:21 executing program 3: clock_gettime(0x9, &(0x7f0000000200)) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000500)) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@local}}, 0xe8) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000240)=0xc) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) syz_genetlink_get_family_id$nbd(&(0x7f00000007c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000780), 0xc, &(0x7f0000000800)={&(0x7f0000000880)=ANY=[]}}, 0x0) setresuid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd10000083bd062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:33:21 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000000)={@random="095e0ca80f58", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "a1d90c", 0x44, 0x0, 0x0, @remote, @local, {[], @gre}}}}}, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000003680)) recvmmsg(0xffffffffffffffff, &(0x7f00000035c0), 0x0, 0x0, &(0x7f00000036c0)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000003700)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001340)={{{@in=@local, @in=@broadcast}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000001440)=0xe8) lstat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001540), &(0x7f0000001580)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) geteuid() lstat(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001780)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000032c0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000033c0)=0xe8) getgroups(0x0, &(0x7f0000003400)) stat(&(0x7f0000003440)='./file0\x00', &(0x7f0000003480)) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007b00)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000007c00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007c40), &(0x7f0000007c80)=0xc) getresuid(&(0x7f0000008540), &(0x7f0000008580), &(0x7f00000085c0)) getegid() geteuid() stat(&(0x7f0000008600)='./file0\x00', &(0x7f0000008640)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008780), 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) getresuid(&(0x7f00000004c0), &(0x7f0000000580), &(0x7f00000005c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000280), 0xc, &(0x7f0000001a40)={&(0x7f0000000600)={0x14}, 0x14}}, 0x0) syz_execute_func(&(0x7f0000000300)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06a95e2ef3ad0f2ca84700000052d85d3724810975097544a200660f38302fba54e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb5f") 03:33:22 executing program 2: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) fremovexattr(0xffffffffffffffff, &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') eventfd2(0x0, 0x0) eventfd(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000019c0)={{{@in6=@local}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xe8) getegid() gettid() fstat(0xffffffffffffffff, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001b80), &(0x7f0000001bc0)=0xc) 03:33:22 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000001780), &(0x7f00000017c0)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r1, &(0x7f00000016c0)=[{&(0x7f0000001280)="9e", 0x1}], 0x1) 03:33:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f00000002c0)=""/165) 03:33:22 executing program 1: prctl$void(0x2f) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000000040)=@buf={0x0, &(0x7f00000000c0)}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in=@dev, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0x223) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000140)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000007c0)=ANY=[]) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) accept4$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x50, &(0x7f0000000700)}, 0x10) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000100)) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000180)={0x30}, 0x11d) getegid() getresgid(&(0x7f0000000300), &(0x7f0000000500), &(0x7f0000000540)) getgid() fstat(0xffffffffffffffff, &(0x7f0000000600)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000880)) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000a40)="42805da0ad5252ef84dc3df83df8eece67f3406e660c54173dc3c381768cc80000000f00c367f00fbab204000000ca366442c1870000000026c462490b31ca67530f0f020abb2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:33:23 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x8b7c8988d3b982b4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000005c0)) ptrace$pokeuser(0x6, 0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000200), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000680)=""/183) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000003c0)={{{@in6, @in=@dev}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f40)={0x0, @dev}, &(0x7f0000000f80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@dev, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000010c0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000001180)={@ipv4}, &(0x7f00000011c0)=0x14) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000600)={0x0, &(0x7f0000000180)}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000240), 0xc, &(0x7f0000001480)={&(0x7f0000001200)={0x14}, 0x14}}, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000340)='cifs.spnego\x00', &(0x7f0000000380), &(0x7f00000007c0), 0x0, 0x0) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000001c0), &(0x7f00000002c0)='keyring\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000040)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000140)=0x4) syz_execute_func(&(0x7f0000000540)="42805da0c10fef69dc430f0f1097660f3a608600088041cb91c461f96f5f36440f18400e770fae9d3d233df20f790ad9eefa6b2179660f38302f8fa95898c61146df01") connect$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 03:33:24 executing program 1: getpriority(0x2, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000080)=0xfffffffffffffdf6) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000340)) eventfd(0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000180)={'rose0\x00'}) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000200)={'syz_tun\x00'}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000740)="52805da0990fef69dc2e3e7b0fe48adf4b51ce51da6ff002ff380f38211af3f081a4768c23ca0000a08081b5b5470f624485cc2167f00fbab204000000ca63ae79dae5e5c461d95969f145450f71f5fbc4090c64ac1e5d31a3b744cc230fd99e0c000000e14ba5") 03:33:24 executing program 1: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x1, @thr={&(0x7f0000000140), &(0x7f0000000280)}}, &(0x7f00000001c0)) getresuid(&(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000a80)) pipe(&(0x7f00000003c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x50, &(0x7f0000000540)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@remote}, &(0x7f00000005c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'vlan0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000680), &(0x7f00000006c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001c80)={'erspan0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@local, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000001e00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001f00)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001f40)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000002040)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'gretap0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002140)={{{@in=@rand_addr, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000002240)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002340)={@remote, @loopback}, &(0x7f0000002380)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002680)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002700)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002740)={@multicast2, @rand_addr}, &(0x7f0000002780)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000027c0)={{{@in6=@local, @in6=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f00000028c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b40)={{{@in=@loopback, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000002c40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000033c0)={&(0x7f0000000200), 0xc, &(0x7f0000003380)={&(0x7f0000000ac0)=ANY=[]}}, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000400)) creat(&(0x7f0000000940)='./file0\x00', 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000300), 0x4) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000480), 0x12) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000440)=ANY=[], 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0376969ef69dc3641e18a23b733c4c2958e0928523026083a35c935c97d197a072d79bbbb63fd799847dec4ba000079aad986f1ffffffe1460f0da11b0000003e66f2400f1a0731a314b706e205c41d1d7f") 03:33:25 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000080)={0x100000000000007}, &(0x7f0000000240), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/create\x00', 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getresuid(&(0x7f0000002e00), &(0x7f0000002e40), &(0x7f0000002e80)) lstat(&(0x7f0000002ec0)='./file0\x00', &(0x7f0000002f00)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f00000033c0)='./file0\x00', &(0x7f0000003400)) getresgid(&(0x7f0000003480), &(0x7f00000034c0), &(0x7f0000003500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000003640)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000003680)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000003700)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003740)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004d40)) getresuid(&(0x7f0000004d80), &(0x7f0000004dc0), &(0x7f0000004e00)) getresgid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000061c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006200)={{{@in=@dev, @in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000006300)=0xe8) stat(&(0x7f0000006340)='./file0\x00', &(0x7f0000006380)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006440)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000006540)=0xe8) lstat(&(0x7f0000006580)='./file0\x00', &(0x7f00000065c0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006640)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006680)={{{@in=@dev, @in=@multicast1}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000006780)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000067c0)) geteuid() getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006900), 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:26 executing program 0: getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e80)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000e40)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000780)) keyctl$get_keyring_id(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000940)) lstat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000a00)=0xc) getegid() fstat(0xffffffffffffffff, &(0x7f0000000b80)) fstat(0xffffffffffffffff, &(0x7f0000000d00)) lsetxattr$system_posix_acl(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='system.posix_acl_default\x00', &(0x7f0000000d80), 0x24, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000380), &(0x7f00000006c0)) timer_delete(0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000740)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f0000000040)={&(0x7f0000000440)=""/208, 0xd0}}, 0x10) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0xfffffda6) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000900)) setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:33:26 executing program 1: unshare(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+'}, 0x28, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:33:28 executing program 3: getrandom(&(0x7f0000000640)=""/104, 0x68, 0x3) keyctl$set_reqkey_keyring(0x4, 0x0) memfd_create(&(0x7f00000000c0)='IPVS\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000001c0), 0xfffffffffffffe51, &(0x7f0000000300)={&(0x7f0000000600)=ANY=[]}}, 0x0) pipe(&(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.usage_all\x00', 0x0, 0x0) ppoll(&(0x7f0000000480), 0x0, &(0x7f00000004c0)={0x0, 0x1c9c380}, &(0x7f0000000500), 0x8) clock_gettime(0x0, &(0x7f0000000180)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000003c0), 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001b40)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600), 0x0) getresuid(&(0x7f0000000700), &(0x7f00000002c0), &(0x7f0000001b80)) timer_create(0x0, &(0x7f0000001a40), &(0x7f0000001a80)) timer_settime(0x0, 0x0, &(0x7f0000001ac0)={{0x77359400}, {0x77359400}}, &(0x7f0000001b00)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f0000000480)='./file0\x00'}, 0x10) utimensat(0xffffffffffffffff, &(0x7f00000006c0)='./file1\x00', &(0x7f00000007c0)={{0x77359400}, {0x77359400}}, 0x0) pkey_alloc(0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000800), 0xc, &(0x7f0000000880)={&(0x7f0000000840)=ANY=[]}}, 0x0) pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001d40)="428055a047f20838c401b1e906699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e3a800476bff745c1e1f7f") getpid() ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000200)={{}, 'syz1\x00'}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:33:28 executing program 5: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="42805da0bf6d66440fd5c3ef69dc221f2122224ac36c41ff0fd9fb34030f38211a67430f4bc50fe0f3410feefaa620780175456467f2430f10af00000000c4010d64ac1e5d31a3b7e2989f7f") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f00000001c0)='.-%\x00', 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[], [], @multicast1}}, 0x20) rt_sigreturn() 03:33:28 executing program 2: getrusage(0x0, &(0x7f0000000200)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) fstat(0xffffffffffffffff, &(0x7f0000000800)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) getgroups(0x0, &(0x7f0000000a00)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/udp\x00') setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece738c19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a2664af4472e671fb0703") shutdown(0xffffffffffffffff, 0x0) 03:33:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 03:33:28 executing program 1: setpriority(0x1, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000180)) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) keyctl$set_reqkey_keyring(0x11, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000600)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ff9000/0x3000)=nil, 0x3000}, &(0x7f0000000300)=0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000000c0)='&securitybdev.mime_type\x00', 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getpgrp(0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000001100)) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) setfsuid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) accept$inet6(0xffffffffffffff9c, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000340)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000380), 0x4) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/status\x00', 0x0, 0x0) 03:33:29 executing program 1: getrusage(0x0, &(0x7f0000000400)) open(&(0x7f00000006c0)='./file0\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) accept4(0xffffffffffffffff, &(0x7f0000000380)=@nl=@proc, &(0x7f0000000180)=0x100000300, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0/file0\x00'}, 0x6e) getpgrp(0xffffffffffffffff) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") 03:33:30 executing program 1: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x4b4103, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280), 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000280)) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) keyctl$set_reqkey_keyring(0xb, 0x0) readlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000380)=""/204, 0x1000000d1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000cc0)) stat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000e00)={0x0, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)='security.SMACK64\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000f00)) getresuid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002480)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) getuid() getpgrp(0x0) getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002540)='/dev/vga_arbiter\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000025c0), &(0x7f0000002600), &(0x7f0000002640)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002ec0), 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000580)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) pipe(&(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 03:33:31 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/mls\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) timerfd_create(0x0, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/create\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000480)='./file1\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a00)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f00000009c0)="6264657624fc766d6e6574312d76626f786e65743000", 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000800), 0x4) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000b00)='cgroup.subtree_control\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000010c0)='./file2\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) wait4(0x0, &(0x7f0000000140), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000280)={0x1d7, &(0x7f0000000200)}) pipe2(&(0x7f0000000040), 0x0) fstat(0xffffffffffffffff, &(0x7f0000000300)) setuid(0x0) clock_gettime(0x0, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000c40)='./file1\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "af480ff4b1fe56f785c37208b486d88f21be9559b21b8a46b8d2724c6b45f19bfeec7432750b0cd94b646640b0de68058431384c692d4682b54f79292d5023c0", "b4b0bee58e6c5af5302622117caa5307254f4ed6a91cabc4d642c721fcd79953"}) memfd_create(&(0x7f0000000ac0)='\x00', 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000c00)={0x0, @multicast1, @dev}, &(0x7f0000000b40)=0x1bc) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) add_key(&(0x7f0000000240)='pkcs7_test\x00', &(0x7f0000000600), 0x0, 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000640), 0x0, 0x0) request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0), &(0x7f0000000500)='#user\\\x00', 0x0) add_key(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580), &(0x7f0000000600), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000680), &(0x7f0000000880)=""/201, 0xc9, &(0x7f0000000700)={&(0x7f00000006c0)={'rmd160-generic\x00'}, &(0x7f0000000980)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000b80)="42805da08abdbd38016dfa19fa762b4242218f8978972bf0817e768cc800008fa938951667670fbab204000000ca4b2178dae5e54175450d6ec2c46279db6752c4e1e1666f076846480703") fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) 03:33:32 executing program 2: ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000180)="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") pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x1, 0x0) ioctl(r2, 0x0, &(0x7f0000000800)) flistxattr(r1, &(0x7f0000000480)=""/184, 0xb8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000380)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0xf2, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') write$P9_RREADDIR(r0, &(0x7f0000000680)={0x87, 0x29, 0x1, {0x4, [{{0x0, 0x0, 0x8}, 0x8, 0xf9e6, 0x7, './file0'}, {{0x80, 0x3, 0x5}, 0x8, 0x5, 0x7, './file0'}, {{0x42, 0x3, 0x8}, 0x3, 0x4f7c778e, 0x7, './file0'}, {{0x40, 0x0, 0x4}, 0x8, 0x2, 0x7, './file0'}]}}, 0x87) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000580)=""/218, 0xda) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[]}}, 0x0) 03:33:32 executing program 4: syz_open_procfs(0x0, &(0x7f00000001c0)='schedstat\x00') fsetxattr(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], &(0x7f0000000240)='\x00', 0x1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000300)) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000200), 0x4) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") clock_gettime(0x0, &(0x7f00000000c0)) clock_settime(0x0, &(0x7f0000000140)) 03:33:33 executing program 0: lstat(&(0x7f0000000240)='.\x00', &(0x7f0000000080)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000300)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000340)={'\x00', @ifru_addrs=@ethernet={0x0, @dev}}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000600)={@remote}, &(0x7f0000000640)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000940)={@mcast1}, &(0x7f0000000980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000009c0)={@local, @remote}, &(0x7f0000000a00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000a40), &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'team_slave_1\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e40)={@multicast2, @rand_addr}, &(0x7f0000000e80)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000ec0)={'ip_vti0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f40)={@dev, @rand_addr}, &(0x7f0000000f80)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000010c0)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140), &(0x7f0000001180)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000017c0)={&(0x7f0000000140), 0xc, &(0x7f0000001780)={&(0x7f00000011c0)={0x14}, 0x14}}, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast2, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000500)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:33:33 executing program 1: unshare(0x0) syz_open_procfs(0x0, &(0x7f0000000240)='net/if_inet6\x00') socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000280)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") 03:33:36 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)) getpid() getpid() dup(0xffffffffffffff9c) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=""/37, 0x25}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:33:36 executing program 1: eventfd(0x0) getpid() remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) eventfd(0x0) seccomp(0x8000000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000200)) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000000c0)={0x0, 0x1, 0x6, @broadcast}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000300)={0x0, 'gre0\x00'}, 0x18) ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe20f0d020721") openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000001c0), 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) 03:33:36 executing program 2: r0 = socket$packet(0x11, 0x802, 0x300) setsockopt$packet_int(r0, 0x107, 0x20000000001, &(0x7f00000000c0)=0x3, 0x3a) 03:33:36 executing program 5: request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="7f7070703173656c6600", 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000700)) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) geteuid() getresgid(&(0x7f0000000080), &(0x7f0000000280), &(0x7f0000000300)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/mls\x00', 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000006c0)) inotify_init1(0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000580), 0xa) prctl$void(0x0) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x50, &(0x7f0000000380)}, 0x10) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000540)) getresgid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") clock_gettime(0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000480)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410fcefa1f1f2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:37 executing program 1: quotactl(0x0, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f0000000140)) getpgid(0x0) pipe(&(0x7f00000006c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) syz_open_procfs(0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs, 0x6e) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000009c0)={{{@in=@loopback, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000540)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000b40)=0xc) stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000dc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c80), &(0x7f0000000e40)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) getresgid(&(0x7f00000084c0), &(0x7f0000008440), &(0x7f0000008400)) stat(&(0x7f0000001180)='./file0/file0\x00', &(0x7f00000011c0)) fstat(0xffffffffffffffff, &(0x7f0000001240)) fstat(0xffffffffffffffff, &(0x7f0000001340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001d00)={{{@in, @in=@dev}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001e00)=0xe8) getresgid(&(0x7f0000001e40), &(0x7f0000001e80), &(0x7f0000001ec0)) getresuid(&(0x7f0000001f00), &(0x7f0000001f40), &(0x7f0000001f80)) stat(&(0x7f0000001fc0)='./file0/file0\x00', &(0x7f0000002000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003600)={{{@in6=@mcast1, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000003700)=0xe8) lstat(&(0x7f0000003740)='./file0\x00', &(0x7f0000003780)) getresuid(&(0x7f0000005dc0), &(0x7f0000005e00), &(0x7f0000005e40)) fstat(0xffffffffffffffff, &(0x7f0000005e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005f00)={{{@in=@local, @in6=@local}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000006000)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006040), &(0x7f0000006080)=0xc) getuid() lstat(&(0x7f00000060c0)='./file0/file0\x00', &(0x7f0000006100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000064c0), &(0x7f0000006500)=0xc) fstat(0xffffffffffffffff, &(0x7f0000006540)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000067c0)={{{@in=@dev, @in6=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000068c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006900), &(0x7f0000006940)=0xc) geteuid() stat(&(0x7f0000006980)='./file1\x00', &(0x7f00000069c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006a40)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000006b40)=0xe8) lstat(&(0x7f0000006b80)='./file0/file0\x00', &(0x7f0000006bc0)) stat(&(0x7f0000006c40)='./file0/file0\x00', &(0x7f0000006c80)) getegid() accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000007fc0), 0x0) syz_execute_func(&(0x7f00000012c0)="42805da0c60fef69dc0f01eece73fe19fae89e1166450f6b361af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe2a5e400fb7e0703") 03:33:38 executing program 1: umount2(&(0x7f0000000340)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) getpgrp(0x0) getpgid(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/cgroup\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, &(0x7f00000006c0)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000080)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000004c0)) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=@known='security.ima\x00', &(0x7f0000000280)=""/125, 0x7d) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000700)={'tunl0\x00'}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000300)={0x0, @remote, 0x0, 0x0, 'none\x00'}, 0x2c) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) creat(&(0x7f0000000540)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000400)=""/168, &(0x7f0000000500)=0xa8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x50, &(0x7f0000000580)}, 0x10) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000680)) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x4) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000180)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:33:40 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) signalfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x3) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) memfd_create(&(0x7f0000000080)='\x00', 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) geteuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000200)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@local, @in=@local}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000f00)=0xe8) getpgid(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003500)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003540)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003a80)) getuid() stat(&(0x7f0000003ac0)='./file0\x00', &(0x7f0000003b00)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000003b80)={{{@in6=@ipv4={[], [], @loopback}, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000003c80)=0xe8) getgroups(0x0, &(0x7f0000003cc0)) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003d00)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003e00)=0xe8) stat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) openat$uinput(0xffffffffffffff9c, &(0x7f0000003f00)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004180)={&(0x7f00000000c0)=@proc, 0xc, &(0x7f0000003a00), 0x0, &(0x7f0000004040)}, 0x0) getgroups(0x0, &(0x7f0000000180)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:33:40 executing program 2: memfd_create(&(0x7f0000000340)="6946813df830007c396fc317236b407c44226e34d42e7cb2d79ac52d7ab3b2c24b5a5d3e9206da56b29d3dd1a2a19e6a3a0b61d01abb6665695a0524c4abea87a5c11f651c6c4ff7b36e3f819847ee23c4d2723562dec0c3c8", 0x100000101) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f00000004c0)='./file0\x00', 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000440)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U+', 0x3}, 0x28, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) getpgid(0x0) rt_sigreturn() 03:33:41 executing program 1: removexattr(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000240)=ANY=[]) utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) socket$unix(0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000740)=0xc) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000480)={&(0x7f00000007c0)=ANY=[]}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/pfkey\x00', 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) add_key(&(0x7f00000002c0)="656e6372797074656400b77657f5e0caadf06f57d8181190d81d21b7db50af37082fcbe888ceb0e98e47fb68a895dcc60dcfb17e0f94b11cbccc5011f88511795e7a6d8d89c255ef31643f987872d3aa512f13e57cfbe0ff7e87b4", &(0x7f0000000200), 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000140)="7248ffff0511", &(0x7f0000000080), &(0x7f00000000c0)='&\x00', 0xfffffffffffffffb) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) gettid() getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/132, &(0x7f0000000500)=0x84) sched_rr_get_interval(0x0, &(0x7f0000000700)) openat(0xffffffffffffffff, &(0x7f0000000780)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000040)='\x00'}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000a00)='team\x00') ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000a40)={'rose0\x00', @ifru_addrs=@xdp}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000b40)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000d40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000dc0)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000004880)=@hci, &(0x7f0000004900)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004940)={@broadcast, @local}, &(0x7f0000004980)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000049c0)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000004ac0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004b00)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000004c00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004c40)={'rose0\x00'}) accept4(0xffffffffffffffff, &(0x7f0000004c80)=@can, &(0x7f0000004d00)=0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@remote, @in=@multicast2}}, {{}, 0x0, @in=@local}}, &(0x7f0000004e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004e80)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004f80)={@loopback}, &(0x7f0000004fc0)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f000000fe00), 0x0, 0x0, &(0x7f000000ffc0)={0x0, 0x989680}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000010000)={@multicast2, @loopback}, &(0x7f0000010040)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010080)={{{@in=@broadcast, @in6=@ipv4={[], [], @loopback}}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000010180)=0xe8) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000b80)) geteuid() stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000880)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000800), 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:33:41 executing program 4: unshare(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000080)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000040)}, 0x10) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:41 executing program 0: rt_sigaction(0x0, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000340)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000640)) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000580)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000140)='eth0-\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)) setxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.nlink\x00', &(0x7f0000000500)={'U+', 0x7}, 0x28, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) nanosleep(&(0x7f0000000440)={0x0, 0x1c9c380}, &(0x7f0000000480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000540)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) utimes(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={{}, {0x77359400}}) readv(0xffffffffffffffff, &(0x7f00000000c0), 0x0) pipe2(&(0x7f0000000600), 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uhid\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x50, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000005c0)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") 03:33:41 executing program 1: mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000500)={0x0, 0x1, 0x6, @dev}, 0x10) ftruncate(0xffffffffffffffff, 0x0) chroot(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @rand_addr}, &(0x7f0000000400)=0xb8, 0x0) renameat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:33:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast1, @rand_addr}, &(0x7f00000000c0)=0xc) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe2(&(0x7f00000004c0), 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000005c0), 0xc, &(0x7f00000007c0)={&(0x7f00000001c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@empty, @local, @dev}, &(0x7f0000000180)=0xc) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000900)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) memfd_create(&(0x7f00000001c0)='.\x00', 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000200)) gettid() add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280), &(0x7f00000002c0), 0x0, 0xfffffffffffffff8) keyctl$setperm(0x5, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/arp\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:33:42 executing program 1: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) unshare(0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) ioprio_get$pid(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040), 0xc, &(0x7f00000003c0)={&(0x7f0000000b00)={0x14}, 0x14}}, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000200)=0x10) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:33:43 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000001ffc)=0x8, 0x1000000f9) dup3(r1, r0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000200)) 03:33:43 executing program 5: getpid() accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') creat(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0/file0\x00', 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[]}}, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000200), &(0x7f0000000380)=0x4) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) geteuid() stat(&(0x7f0000000c40)='./file0/file0/file0\x00', &(0x7f0000000c80)) getuid() fstat(0xffffffffffffffff, &(0x7f0000001380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001400), &(0x7f0000001440)=0xc) getegid() getresuid(&(0x7f0000001600), &(0x7f0000001640), &(0x7f0000001680)) getegid() getresuid(&(0x7f0000003740), &(0x7f0000003780), &(0x7f00000037c0)) fstat(0xffffffffffffffff, &(0x7f0000003800)) fstat(0xffffffffffffffff, &(0x7f0000003880)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003900)={{{@in=@remote, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000003a00)=0xe8) getegid() getuid() stat(&(0x7f0000003a40)='./file0/file0/file0\x00', &(0x7f0000003a80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003b00)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003c00)=0xe8) getresgid(&(0x7f0000003c40), &(0x7f0000003c80), &(0x7f0000003cc0)) geteuid() lstat(&(0x7f0000003d00)='./file0/file0/file0\x00', &(0x7f0000003d40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003f00), 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000480)) stat(&(0x7f0000000600)='./file0/file0/file0\x00', &(0x7f0000000640)) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000016c0)="428055a0866969ef69dc00d9f0008f00008020c4a25d0c4d881837370f38211ac4c19086d9f28fc9410feefa0707430f76a300800000e5e54175450feab82ed37e2ed37e990000008066400f3a14150008000011f0802403088e9fc421f97087b90000000f7fb3dffbc941") openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffb) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f00000006c0), 0xc, &(0x7f0000000780)={&(0x7f00000004c0)=ANY=[]}}, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000540)) syz_execute_func(&(0x7f0000000700)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:33:43 executing program 1: getrandom(&(0x7f00000006c0)=""/148, 0x82, 0x5) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[], 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000001c0)=""/122) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000180)) 03:33:44 executing program 1: getpgrp(0x0) getpgrp(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0x3, &(0x7f0000000800), &(0x7f0000000240)='GPL\x00', 0x0, 0xaa, &(0x7f0000000880)=""/170}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000740)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_flowlabel\x00') dup2(0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfc8b) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000003c0)=ANY=[], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(0xffffffffffffff9c, &(0x7f0000002bc0), 0x0, 0x0, &(0x7f0000002e00)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='system!\x00system\x00'}, 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000180), 0x10) seccomp(0x1, 0x0, &(0x7f0000001ac0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000058fe8}]}) utimes(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000580), 0x0, 0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000180), &(0x7f00000000c0)) syz_execute_func(&(0x7f0000000500)="1cd2805da0616969692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9c81ceefa6be27973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df55b498985fc3") 03:33:45 executing program 1: ftruncate(0xffffffffffffffff, 0x0) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0xfffffffffffffee4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x3bd, @local}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0376969ef69dc3641f3400fc737c4c2958e09f945f9450f7f7f3766460f38e3450f7777e94590c4e14e52d8d962788f35c935c97d197ab979fbc463fd7998b400ba000079aa8f296002f1e1210f0da11b000000010df7ac1e5dc4213c59fb99") 03:33:47 executing program 2: mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x4000, 0x8, &(0x7f0000ffc000/0x4000)=nil) pipe(&(0x7f0000000780)) connect(0xffffffffffffffff, &(0x7f0000000340)=@sco, 0x80) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000140)}, 0x10) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f00000001c0)}, 0x10) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000480)) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c80)={{{@in=@local, @in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000002d80)=0xe8) getgroups(0x0, &(0x7f0000002dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002e00)) fstat(0xffffffffffffffff, &(0x7f0000002e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002f40)={{{@in6=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003040)=0xe8) lstat(&(0x7f0000003080)='./file0\x00', &(0x7f0000000680)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003140)) fstat(0xffffffffffffffff, &(0x7f0000003180)) getresgid(&(0x7f0000003200), &(0x7f0000003240), &(0x7f0000003280)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000032c0)={{{@in6=@dev, @in=@dev}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000033c0)=0xe8) lstat(&(0x7f0000003400)='./file0\x00', &(0x7f0000003440)) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003680), &(0x7f0000000200)=0x6) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003a00)) getuid() getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004680)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000046c0)={{{@in6=@remote, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000047c0)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000004840)='\x00'}, 0x30) getresuid(&(0x7f00000005c0), &(0x7f0000000540), &(0x7f0000000400)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000049c0)={{{@in=@local, @in6=@local}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@multicast1}}, &(0x7f0000004ac0)=0xe8) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b00)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004c00)=0xe8) stat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004d00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004d40)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000004e40)=0xfd44) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000440)) geteuid() lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000600)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006380), &(0x7f00000063c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000006400)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006480), &(0x7f00000064c0)=0xc) getresuid(&(0x7f0000000140), &(0x7f0000000040), &(0x7f00000001c0)) lstat(&(0x7f00000065c0)='./file0\x00', &(0x7f0000006600)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000079c0)={{{@in6, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000007ac0)=0xe8) getresgid(&(0x7f0000007b00), &(0x7f0000007b40), &(0x7f0000007b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000007c00)=0xc) geteuid() getegid() getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007c40)={{{@in=@local, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000007d40)=0xe8) getgroups(0x0, &(0x7f0000007d80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007dc0)) getresuid(&(0x7f0000007e00), &(0x7f0000007e40), &(0x7f0000007e80)) stat(&(0x7f0000007ec0)='./file0\x00', &(0x7f0000007f00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007f80)={{{@in=@loopback, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000008080)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") getpid() syz_execute_func(&(0x7f00000004c0)="42805da0c60fc069dd0f01eecec273fefefa380f387c36670f5714b6f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179c4417567bb00203333e56b6a410febbd0900007c00000f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:33:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:33:50 executing program 4: symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) fstat(0xffffffffffffff9c, &(0x7f0000000280)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) getgid() stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) setfsgid(0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rtc0\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f0000000880)=""/243, 0xf3) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:33:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:33:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:33:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:33:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:33:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:33:53 executing program 5: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) pselect6(0x40, &(0x7f0000003380), &(0x7f0000003300), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000880)={&(0x7f0000000840), 0x8}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000003100), &(0x7f0000003180)=0x6e, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000031c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000003240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003280)='/dev/rtc0\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000032c0)) socket$nl_netfilter(0x10, 0x3, 0xc) clock_adjtime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0c26969ef69dc00d9906920375137c339392a8e0f38211a0fdcd664a741fae0400f01efe5e5417545460f44352f7d00001a1a01460f01ee31a3b786e298262e64f30f2b05090000003f") getpeername(0xffffffffffffff9c, &(0x7f00000033c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000003440)=0x80) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RLERROR(r0, &(0x7f0000000080)={0x9}, 0x9) 03:33:53 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) write$P9_RGETATTR(r0, &(0x7f0000000180)={0xa0}, 0xa0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x8408a) 03:33:55 executing program 2: keyctl$set_reqkey_keyring(0x7, 0xfffffffffffffffc) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000700)='./file1\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000080), 0x35e) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000140)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000500), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)='}self]wlan1bdev%\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@dev, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000840)=0xe8) getgroups(0x0, &(0x7f0000000880)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000009c0)=0xe8) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c80)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000d80)=0xe8) getresgid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80), &(0x7f0000000ec0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in=@multicast1, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000001000)=0xe8) lstat(&(0x7f0000001040)='./file1\x00', &(0x7f0000001080)) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001700)={{{@in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000001800)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001880)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001840)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@dev, @in=@local}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000019c0)=0xe8) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000001a00)='user%\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001a80)={{{@in6=@loopback, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000001b80)=0xe8) getresgid(&(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001d00)={{}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001e00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001e40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002780)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000002740)='wlan1&[user\x00'}, 0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:33:58 executing program 1: timer_create(0x0, &(0x7f0000000ac0)={0x0, 0x2a, 0x0, @thr={&(0x7f0000000400), &(0x7f0000000980)}}, &(0x7f0000000a80)) timer_gettime(0x0, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) getgid() getpgrp(0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000680)=0xe8) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) stat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) clock_gettime(0x0, &(0x7f0000001680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 03:33:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) signalfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:33:59 executing program 1: gettid() openat$keychord(0xffffffffffffff9c, &(0x7f0000000200)='/dev/keychord\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000280)='syz0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000240)='systemppp0bdevvmnet1\x00'}, 0x30) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000006c40)) getrandom(&(0x7f0000000300)=""/104, 0x68, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000006c00)='systemppp0bdevvmnet1\x00'}, 0x10) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000008c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) openat$cgroup(0xffffffffffffffff, &(0x7f0000001c40)='syz0\x00', 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c80)) getpgrp(0x0) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003140)) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006580), &(0x7f00000065c0)=0xc) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000040)) sendmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000003c0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000001cc0)}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006600)) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:34:00 executing program 1: getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000280)=""/250, 0xfa) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000000c0), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) iopl(0x0) syz_execute_func(&(0x7f0000000140)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f3c40115754d0deefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e367660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:34:01 executing program 1: add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0), 0x0, 0x0, 0xfffffffffffffffe) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cgroup.controllers\x00', 0x0, 0x0) eventfd(0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000280)) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000140), &(0x7f0000000200), 0x0, 0xfffffffffffffffa) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000002c0)='tasks\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000300)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000004c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380), &(0x7f00000003c0), 0x0, 0x0) syz_execute_func(&(0x7f0000000500)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000000)="736d617073009223300ed429bc1629a3904cd7e9657f400b8dd19fcb5a8d61fa1cde666e59bea345efc705e61e5f77f53a36137a6d9b860000000000000000000000000000000000") pread64(0xffffffffffffffff, &(0x7f0000df6000), 0x0, 0x0) 03:34:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:34:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:34:12 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x0) munlockall() clock_gettime(0x0, &(0x7f0000000040)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003900)={{{@in=@broadcast, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000001740)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001780)={0x0, @dev, @dev}, &(0x7f0000001800)=0xc) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000003a80)={@loopback, @multicast1}, &(0x7f0000003ac0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003b00)={'ifb0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000003c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003c80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003cc0)={'veth1_to_bond\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003d00)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003d40)={@ipv4={[], [], @loopback}}, &(0x7f0000003d80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003dc0)={{{@in=@loopback, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000003ec0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003f00)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f00000040c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004100)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004200)={{{@in6=@mcast2, @in=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000004300)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004800)={@dev}, &(0x7f0000004840)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004880)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000004980)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000049c0)={"746e616d5f736c655f30000100008000"}) accept$packet(0xffffffffffffff9c, &(0x7f0000004a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004a40)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004c40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004c80)={0x0, @dev, @multicast1}, &(0x7f0000004cc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004d00)={{{@in6=@loopback, @in=@remote}}, {{@in=@multicast2}}}, &(0x7f0000004e00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000a100)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000a200)={'veth0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f000000a240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a280)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f000000a300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a380)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f000000a480)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000a840)={'bridge_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f000000a8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a900)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000b140)={&(0x7f0000000480), 0xc, &(0x7f000000b100)={&(0x7f000000a940)={0x14}, 0x14}}, 0x0) getresuid(&(0x7f0000000200), &(0x7f0000000080), &(0x7f00000003c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000400)=""/80) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000280)=""/76, &(0x7f00000001c0)=0x4c) recvmmsg(0xffffffffffffffff, &(0x7f0000005200), 0x0, 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 03:34:12 executing program 4: sync() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000540)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0), 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000340)='cifs.idmap\x00', &(0x7f0000000400), &(0x7f0000000440)='mime_type\'}wlan1\x00', 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000100), 0x10) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000240), &(0x7f0000000280), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f0000000040)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002146d9e46b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000005c0)='yeah\x00', 0x5) getcwd(&(0x7f00000004c0)=""/63, 0x3f) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[]}}, 0x0) prctl$setendian(0x14, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000580)={'U+', 0x7}, 0x28, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000780)=""/87) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f00000002c0)) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) 03:34:12 executing program 5: clock_gettime(0xfffffffffffffffd, &(0x7f0000000600)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f00000000c0)) creat(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000240)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000640)="428055a027c4e1ce582d0000000000d96736e60641ff0f1837370f38211ac4c190aad9f28fc90f194120c461781337e5e50f2e1ac4010d64ac1e5d31a3b70ac6cef6cef62dd541029fc402c18c26") 03:34:12 executing program 2: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000340)={0x0, 0x0, 0xfc010000}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000780)="42805da0520fef84dc0f01eece67f3406e660c541af3f081768cc8000000df690067f00fbab204000000cac4e1057668d55cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:34:13 executing program 1: pipe2(&(0x7f0000000140), 0x7fffe) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000680)=""/62) clock_getres(0x0, &(0x7f0000000040)) getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42805da0be0fef69dc0f01eecee3148c8c550f0fb8f0817e728cc8000081b5e5bc2b0000002167f06ec4c279798ffbd3bab100cac441795b64ae01dae56e652f922e1ac4010d64ac1e5d3117b7f0dbe2fc0703") seccomp(0x0, 0x0, &(0x7f0000000100)) add_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000600), 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f00000006c0)=""/73, 0x49) timerfd_create(0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) seccomp(0x0, 0x0, &(0x7f00000002c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) utimes(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)={{0x77359400}, {0x77359400}}) write$tun(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000800), &(0x7f0000000280)=0x68) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:34:13 executing program 1: unshare(0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000800)=""/4) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000240)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000280), &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.events\x00', 0x0, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000140), 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0336969ef69dc364180c7e041a30f7f7f3766460f38285230c4637905a70d000000c135c935c97d197a0779fb8f2860ceeba679cbff43d0e1460f0da11b000000010d64ac1e5d31a314b706e242d08039c52a7d987b7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@remote, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a00), 0x0, 0x0) getegid() lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)) 03:34:14 executing program 1: getrandom(&(0x7f0000000640)=""/148, 0x94, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() fstat(0xffffffffffffff9c, &(0x7f0000000700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000340)=0xc) getgid() getegid() getegid() getgid() getgroups(0x0, &(0x7f0000000440)) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000700)=ANY=[]) getcwd(&(0x7f0000000040)=""/128, 0x80) syz_execute_func(&(0x7f00000002c0)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc4a1785a98f2930000a2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01ef22e5d70fecec1a1ac4a159e9242001ee45df7d9f") syslog(0x0, &(0x7f0000000380)=""/147, 0x93) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:15 executing program 5: keyctl$set_reqkey_keyring(0xb, 0xfffffffffffffffd) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@dev, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000480)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002880)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 03:34:15 executing program 1: clock_adjtime(0x0, &(0x7f0000000340)) unshare(0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f0000000140), 0x0, 0xfffffffffffffffe) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) getitimer(0x0, &(0x7f0000000440)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@local, @loopback}, 0xc) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'veth0_to_bridge\x00', {0x2, 0x0, @loopback}}) socket$inet_udp(0x2, 0x2, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f0000003f80)) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000040c0)={'gre0\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000001c0)="cf045c5804b5901205a49b613a3b4af3", 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)) lgetxattr(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)=ANY=[], &(0x7f0000000500)=""/252, 0xfc) set_tid_address(&(0x7f0000000380)) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000003c0)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @dev}}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000cc0)=ANY=[], 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000600)) write$nbd(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in=@broadcast, @in=@dev}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000800)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000840), &(0x7f0000000880)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @multicast1, @loopback}, &(0x7f0000000900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000940)={{{@in=@rand_addr, @in6=@local}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000a40)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in=@broadcast, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000cc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000ec0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in=@rand_addr, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000001080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in=@rand_addr, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f00000011c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001240)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001380)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001440)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001540)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001640)={@remote, @multicast2}, &(0x7f0000001680)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f00000063c0), 0x0, 0x0, &(0x7f0000004040)={0x77359400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006580)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000006680)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f00000066c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006700)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006a00)={{{@in=@loopback, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000006b00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007080)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007340)={{{@in=@multicast1, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000007440)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000007480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000074c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007500)={{{@in6=@local, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000007600)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000007640)=@ll, &(0x7f00000076c0)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007700)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007740)={@local}, &(0x7f0000007780)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000077c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007800)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000078c0)={{{@in, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000079c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007a00)={@remote, @multicast1}, &(0x7f0000007a40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007a80)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000007b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007bc0)={{{@in=@dev, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000007cc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007d00), &(0x7f0000007d40)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007d80)={{{@in6=@ipv4={[], [], @multicast1}, @in=@loopback}}, {{@in6}, 0x0, @in6}}, &(0x7f0000007e80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007ec0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000007fc0)=0xe8) 03:34:16 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@rc, &(0x7f00000000c0)=0x80, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) getpgid(0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) timer_create(0x0, &(0x7f00000002c0), &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:18 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:34:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7ff}, 0x0, 0x0, 0x0, 0x0, 0xed26}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) mount(&(0x7f000000a000), &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, &(0x7f000001c000)) chdir(&(0x7f0000000180)='./file0\x00') r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_bridge\x00', 0x4}, 0x18) ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000440)) write$eventfd(r0, &(0x7f0000000080), 0xfffffe5e) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='veth1_to_team\x00', 0x2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'syzkaller1\x00'}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x4, 0x80000001}) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x800) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) 03:34:21 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) timer_create(0x0, &(0x7f0000000180), &(0x7f0000000340)) timer_delete(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0a10fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90df9f7f") mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) geteuid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000540)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@broadcast, @in6=@local}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000440), 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f0000000480)) socket$packet(0x11, 0x0, 0x300) eventfd(0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() getgroups(0x0, &(0x7f0000000240)) getpeername(0xffffffffffffff9c, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000680)=0x80) dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) pipe2(&(0x7f00000003c0), 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000480)) fchmod(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000240)}}, &(0x7f0000000500)) timer_gettime(0x0, &(0x7f0000000140)) 03:34:21 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x40400, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000080)=0x80) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)) ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000240)={0x0, @dev, 0x0, 0x0, 'sed\x00'}, 0x2c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0690fef69dc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9c4a27d197a0779fbc463fd7998b400ba0000ffff75452e0ac4010d64ac1e5d31a314b706e298987b7f") 03:34:21 executing program 4: getgroups(0x21b, &(0x7f0000000400)) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000140), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0), &(0x7f0000000280), 0x0, 0x0) memfd_create(&(0x7f0000000380)='\x00', 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) socket$packet(0x11, 0x0, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000400), 0xffffffffffffff52) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x0, @mcast2}, 0x1c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001940)="7461736b7300cfa405dec7636bf7c298af87f49e1fe23b43c0b81ea5f7226875edc415e016735556635abcc7937ee98f251cf6c45ea83adc16e920c709e7e525d4fa089e32210f92283478136912a3f3a45e86e5d0c2a15440009779b2bf09d6ff00b96b7c14bc93cd8d44a81b259189555b5846a6f42e2d490e13bf06e7236a4a988848ff73af341aa4d0f9e068610e364bbd80516445b9edb2bd308c75b5f5f34c44ea85e9f253d2571968162225805218801df008b14bac4d3a4bfe48bca0145401cfaff12b171602277b331e13418be6db8f4805e3a5038dceebc3d13a803cc781023f", 0x2, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") mlockall(0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000540)) creat(&(0x7f00000001c0)='./bus/file0\x00', 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000740)=""/4096) fchmod(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:21 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "1c51d33d3389c55033a2869b4b447593ec82907486eb3a676ce231f8f36fe027"}) 03:34:22 executing program 0: futex(&(0x7f0000000280), 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) inotify_init() openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/checkreqprot\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000680)) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) fstat(0xffffffffffffff9c, &(0x7f0000000380)) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[], 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@rand_addr, @in6=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000580)=0x1c) add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffff9) getresuid(&(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240), 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, 0x0, 0x0) getrandom(&(0x7f0000000280)=""/104, 0x3e4, 0x0) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") add_key(&(0x7f0000000340)='cifs.idmap\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffff9) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:34:27 executing program 2: prctl$intptr(0x17, 0x0) seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000240)) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) setresgid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fec4e161763f380f38211af3f0817e768cc8000000000fd9595df00fbab204000000ca6b2979dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:35 executing program 1: munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) getpid() getgid() lstat(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000840)) setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) sysinfo(&(0x7f0000000140)=""/245) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4(0xffffffffffffff9c, &(0x7f0000000380)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000400)=0x80, 0x0) futex(&(0x7f0000000440), 0x0, 0x0, &(0x7f0000001e00)={0x0, 0x989680}, &(0x7f0000000500), 0x0) getpid() dup(0xffffffffffffffff) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') accept4(0xffffffffffffffff, &(0x7f0000000980)=@ll, &(0x7f0000000800)=0x80, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000ac0), &(0x7f0000000b00)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000010c0)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001140)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001180)={@empty, @loopback}, &(0x7f00000011c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001200)={{{@in=@loopback, @in=@remote}}, {{}, 0x0, @in=@dev}}, &(0x7f0000001300)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000001340)=@hci, &(0x7f00000013c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001400)={@empty, @loopback}, &(0x7f0000001440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000001580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000015c0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001600)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001c40)={0x0, @local, @remote}, &(0x7f0000001c80)=0xc) accept(0xffffffffffffffff, &(0x7f0000001cc0)=@xdp, &(0x7f0000001d40)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001dc0)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003540)={&(0x7f0000000640), 0xc, &(0x7f0000003500)={&(0x7f0000002ec0)={0x14}, 0x14}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) fcntl$getflags(0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00'}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000001e40)=""/97) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000002c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") sendto$inet6(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x0, 0x0, 0x0) keyctl$session_to_parent(0x12) chdir(&(0x7f0000000480)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000700)=""/227, 0xe3}, 0x0) 03:34:36 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000680), 0xffffffffffffffff) pipe2$9p(&(0x7f0000000180), 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)) pipe2(&(0x7f0000000080), 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000580)={'ipddp0\x00', {0x2, 0x0, @dev}}) unshare(0x0) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000040)={0xffffffffffffffce}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x14}, 0x14}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000540)) syz_execute_func(&(0x7f0000000440)="42805da0b60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54117c8f7f7010d64ac1e5d31a3b744dbe271fb0703") getrandom(&(0x7f0000000300)=""/182, 0xb6, 0x0) 03:34:36 executing program 1: pipe2(&(0x7f0000000180), 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000040)='syz1\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000006f40)="408055a049c421a05d2f8a20a6a4b9a4b9d84167c3397c2a0f0fcde6300f7821d8ede0400f01efe5e57d0f069cf90cd9d91a1a00460dc4210311ce47da6c3e2f9f") fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d00), &(0x7f0000004d40)=0xc) lstat(&(0x7f0000004d80)='./file0\x00', &(0x7f0000004dc0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004e40)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000004f40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004f80), &(0x7f0000004fc0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000054c0)) lstat(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)) lstat(&(0x7f00000055c0)='./file0\x00', &(0x7f0000005600)) gettid() stat(&(0x7f00000057c0)='./file0\x00', &(0x7f0000005800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005880), &(0x7f00000058c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005900)) stat(&(0x7f0000005980)='./file0\x00', &(0x7f00000059c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a40), &(0x7f0000005a80)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005ac0)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000005bc0)=0xe8) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006640)) lstat(&(0x7f0000006680)='./file0\x00', &(0x7f00000066c0)) stat(&(0x7f0000006740)='./file0\x00', &(0x7f0000006780)) getpgrp(0xffffffffffffffff) getuid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006800), &(0x7f0000006840)=0xc) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006880), &(0x7f00000068c0)=0xc) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006900)={{{@in=@local, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000006a00)=0xe8) lstat(&(0x7f0000006a40)='./file0\x00', &(0x7f0000006a80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006b00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006b40)={{{@in=@remote, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000006c40)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006d80), 0x0, 0x0) 03:34:37 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a02e6969ef69dc00d9f4e37d0fe1ff693020375137c3c3392a8e0f38211a40a564a741dfe0c482599334e6e5e54175451a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:34:38 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:38 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)={0xfffffffc, 0xffffffffffffffff}) setpriority(0x1, 0x0, 0x0) 03:34:38 executing program 3: futex(&(0x7f0000000600), 0x1, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) getpid() getpgrp(0x0) sched_rr_get_interval(0x0, &(0x7f0000000c40)) openat(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000940)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000480)=@generic) exit_group(0x0) 03:34:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000180)={0xff, 0x0, 0x2, 0xa7db, 0x10000, 0x6, 0x81, 0xffffffff, 0x0, 0x5, 0x6, 0x4}) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x5f5) getdents(r1, &(0x7f0000000140)=""/2, 0x450) 03:34:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@dev, @in=@multicast2}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000400)=0x388) openat$pfkey(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000600)=@abs, &(0x7f0000000680)=0x6e) getgid() write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) request_key(&(0x7f0000000080)='big_key\x00', &(0x7f0000000140), &(0x7f0000000180)='proc\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000500), 0x0, 0x0, 0xfffffffffffffffa) openat$dir(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200), 0x0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000480)=0x6e) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x57cdea44c3a50216) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000004c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/status\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000580)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:34:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) unlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 03:34:43 executing program 0: setfsuid(0x0) clock_adjtime(0x0, &(0x7f0000000280)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000001c0)=0x1c, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000200), 0x8) pipe2(&(0x7f0000000440), 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getresgid(&(0x7f0000000140), &(0x7f0000000380), &(0x7f0000000b40)) fstat(0xffffffffffffffff, &(0x7f0000000b80)) lstat(&(0x7f0000000c00)='./file1\x00', &(0x7f0000000d40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) getresgid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) setgroups(0x0, &(0x7f0000000f00)) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000700)) sysinfo(&(0x7f00000008c0)=""/245) seccomp(0x0, 0x0, &(0x7f0000000fc0)={0x20000000000002e0, &(0x7f0000001000)}) add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0), &(0x7f0000000240), 0x0, 0xfffffffffffffffd) fstat(0xffffffffffffffff, &(0x7f00000004c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000540)=0xc) lstat(&(0x7f0000000580)='./file0/file0\x00', &(0x7f00000009c0)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getgroups(0x0, &(0x7f0000000b40)) keyctl$get_keyring_id(0x0, 0x0, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000740)=@known='trusted.overlay.impure\x00', &(0x7f0000000780)=""/227, 0xe3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000b00)=0xfffffd67) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000880)) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a0610fefe9dce9d92a5c41ff0f1837370f08211ac4c482fd2520410feefaf2e538e5f55de0932ebc2ebc0d64ac1e5d9f7f") 03:34:43 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:44 executing program 3: futex(&(0x7f00000000c0), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.stat\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") clock_getres(0x0, &(0x7f0000000140)) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:34:44 executing program 1: prctl$setname(0xf, &(0x7f0000001300)='cifs.spnego\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:34:45 executing program 1: getitimer(0x1, &(0x7f0000000200)) pipe2(&(0x7f0000000140), 0x0) sched_yield() ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000500)=""/62) clock_getres(0x0, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000280)=0xc) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000340)=0x10) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000600)="42805da0be0fef69dc0f4201eece73fe19fa380f3821f0817e768cc8000081b5e5bc2b0000002167f06ebab204000000cac441795b64ae01dae5f3460f58f975450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") times(&(0x7f0000000380)) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000480)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}, 0x5c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) dup(0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f0000000180)}, 0x10) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000240)) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000300)) 03:34:45 executing program 2: alarm(0x0) clock_getres(0x0, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000040)) creat(&(0x7f0000000280)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='pids.events\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)="6d616d6f7202aad602656e747300", 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") 03:34:46 executing program 1: munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000d00)="428055a0876969ef69dc00d9f0008f00008020c421fa7fb432322333331837370f38211ac4c461cde2d3410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706f0802403089f4b") 03:34:47 executing program 1: clone(0x48000, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000340), &(0x7f00000003c0)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) sysinfo(&(0x7f0000000a00)=""/235) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'veth1_to_bridge\x00'}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000100)={@loopback}, 0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1, @rand_addr}, &(0x7f00000001c0)=0xc) set_tid_address(&(0x7f0000000000)) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000280)=ANY=[], 0xffffffffffffff98) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) syz_execute_func(&(0x7f0000000040)="af8055a0596969ef69dc00d99066410f91bad33f00007c2aaf200f43fd64a741dfe0400f01efe5e57d0fecec1a01460f01ee31a3b786e6989f") ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f00000002c0)) 03:34:48 executing program 1: clock_gettime(0xffffffffffffffbe, &(0x7f0000000380)) inotify_init() futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) sendmmsg(0xffffffffffffffff, &(0x7f0000001e40), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000001f00)=@xdp, &(0x7f0000001f80)=0x80) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/49) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001fc0)={0x0, 0x1, 0x6}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000180)={0xff, 0x0, 0x2, 0xa7db, 0x10000, 0x6, 0x81, 0xffffffff, 0x0, 0x5, 0x6, 0x4}) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x5f5) getdents(r1, &(0x7f0000000140)=""/2, 0x450) 03:34:49 executing program 1: eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000580)='./file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) getpgrp(0x0) getgid() getpgrp(0x0) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) lstat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001940)) getresgid(&(0x7f0000001980), &(0x7f00000019c0), &(0x7f0000001a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) getpgid(0x0) getgroups(0x0, &(0x7f0000003d40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000003d80)='{[+ppp0^\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f00), &(0x7f0000003f40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getpid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23e66440f55ab0000ffffd8c70b00000244be80cc39390f383065f047fe06450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:34:49 executing program 5: keyctl$set_reqkey_keyring(0x10, 0x4) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000180)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffa) getgroups(0x0, &(0x7f0000000400)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:34:50 executing program 0: clock_gettime(0x3, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a40)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f80)={{{@in6, @in6=@ipv4={[], [], @local}}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000001080)=0xe8) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001180)) getuid() fstat(0xffffffffffffffff, &(0x7f00000011c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001a40)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000001a00)='self@{+}\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002cc0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000002e00)=0xe8) getgroups(0x0, &(0x7f0000002e40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002e80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002ec0), &(0x7f0000002f00)=0xc) lstat(&(0x7f0000002f40)='./file0\x00', &(0x7f0000002f80)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003180)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003280)=0xe8) getgroups(0x0, &(0x7f00000032c0)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000039c0)={{{@in, @in=@loopback}}, {{}, 0x0, @in=@dev}}, &(0x7f0000003ac0)=0xe8) getgroups(0x0, &(0x7f0000003b00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000041c0)={{{@in=@rand_addr, @in=@broadcast}}, {{}, 0x0, @in6=@local}}, &(0x7f00000042c0)=0xe8) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004340), 0x0, 0x0) getpid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000240)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000140), &(0x7f00000002c0)=0x8) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe95fa380f38217f1af3f3817e768cc80000000081b5e5b42b00000021abf00fbab204000000cafc205bdae5e54175450f2e1ac4010d64ac1e5d31a3b73e670f530c2771fb0703") 03:34:50 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x200000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@getspdinfo={0x14, 0x25, 0x15}, 0x14}}, 0x0) 03:34:52 executing program 3: setitimer(0x0, &(0x7f0000000640), 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) getuid() syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001200)=""/214, &(0x7f00000000c0)=0xd6) keyctl$get_persistent(0x16, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000001340)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001380)={@remote, @local}, &(0x7f00000013c0)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001440)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001480)={@multicast1, @remote}, &(0x7f00000014c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001540)={{{@in6=@loopback, @in6}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000001640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'syzkaller1\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000017c0)=0x14) eventfd(0x0) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000300), 0xc, &(0x7f0000000600)={&(0x7f00000006c0)=ANY=[]}}, 0x0) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 03:34:52 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x200000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@getspdinfo={0x14, 0x25, 0x15}, 0x14}}, 0x0) 03:34:52 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000180)={0xff, 0x0, 0x2, 0xa7db, 0x10000, 0x6, 0x81, 0xffffffff, 0x0, 0x5, 0x6, 0x4}) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x5f5) getdents(r1, &(0x7f0000000140)=""/2, 0x450) 03:34:54 executing program 2: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000580)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) lremovexattr(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)=ANY=[]) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x0, 0x0) lremovexattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=ANY=[]) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000540)) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000280)=0x10) socket$unix(0x1, 0x0, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, &(0x7f0000000680)=0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000700)='/dev/rtc0\x00', 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000040)=0x80) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000500)=ANY=[], &(0x7f0000000540)) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)) getresgid(&(0x7f0000000a00), &(0x7f0000000840), &(0x7f00000009c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) lstat(&(0x7f0000000400)='./file1\x00', &(0x7f0000000600)) getgroups(0x0, &(0x7f00000006c0)) getrandom(&(0x7f0000000700)=""/148, 0x94, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uinput\x00', 0x0, 0x0) get_thread_area(&(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000002c0), 0x4) getgid() gettid() socket$key(0xf, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) lstat(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001dc0)={{{@in6=@mcast1, @in=@dev}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@broadcast}}, &(0x7f0000001ec0)=0xe8) stat(&(0x7f0000001f00)='./file0\x00', &(0x7f0000001f40)) 03:34:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x200000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@getspdinfo={0x14, 0x25, 0x15}, 0x14}}, 0x0) 03:34:54 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @multicast2}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @multicast2}, 'lo\x00'}) add_key(&(0x7f00000005c0)='trusted\x00', &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:34:54 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x200000000000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@getspdinfo={0x14, 0x25, 0x15}, 0x14}}, 0x0) 03:34:54 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000280)=0x14) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0) sync() eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) 03:34:55 executing program 1: futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) clock_settime(0x0, &(0x7f00000002c0)={0x0, 0x1c9c380}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000a80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:34:56 executing program 1: clock_adjtime(0x0, &(0x7f00000004c0)) setrlimit(0x0, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="428055a0be6969ef69dc00d9ce41fb0f183737c4c19086d9f28fc9410feefa4e0f79fbe5e54175450f2e1ac4011d64ac1e5d31a3b767e2989fc4217dd7e9") seccomp(0x0, 0x0, &(0x7f0000000100)) recvmmsg(0xffffffffffffffff, &(0x7f0000000ac0), 0x0, 0x0, &(0x7f0000002f00)={0x0, 0x1c9c380}) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0), &(0x7f0000000840)=0x53acb0a2abf79f16) stat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000c40)) eventfd2(0x0, 0x0) pipe2(&(0x7f00000000c0), 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000300)=""/65}, 0x18) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mincore(&(0x7f00002f6000/0x3000)=nil, 0x3000, &(0x7f0000000180)=""/221) mmap(&(0x7f00002f5000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f00000005c0)) lstat(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000b40)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@local, @in=@remote}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000780)=0xe8) 03:34:57 executing program 0: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getuid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:34:57 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) getgid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8923, &(0x7f0000000100)={'tunl0\x00', @ifru_settings={0x0, 0x0, @sync=&(0x7f0000000140)}}) pipe2$9p(&(0x7f0000000480), 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@dev, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) socket(0x0, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f00000002c0)) setitimer(0x2, &(0x7f0000000100), &(0x7f0000000180)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000800)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000780)={'system_u:object_r:anacron_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x8}, 0x57) 03:34:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x100000000004) bind$netlink(r0, &(0x7f0000461000)={0x10, 0x0, 0x2}, 0xc) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") bind$netlink(r0, &(0x7f0000000100)={0x10, 0x0, 0x2, 0xfffffffffffffffe}, 0xc) 03:34:57 executing program 5: syz_genetlink_get_family_id$ipvs(&(0x7f0000000a40)='IPVS\x00') ftruncate(0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/mls\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000b80)=0xe8) getegid() gettid() geteuid() getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000002800)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000028c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000002880)='/dev/zero\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002900)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@ipv4={[], [], @multicast2}}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000002a00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), &(0x7f0000002a80)=0xc) gettid() lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002fc0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000030c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000003140)=0x128) getpid() getgroups(0x4000000000000003, &(0x7f00000032c0)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000003300)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000047c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000004780)='IPVS\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004800)={{{@in, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getegid() getpgrp(0x0) getresuid(&(0x7f0000004940), &(0x7f0000004980), &(0x7f00000049c0)) getgroups(0x0, &(0x7f0000004a00)) stat(&(0x7f0000004a40)='./file0\x00', &(0x7f0000004a80)) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004d80)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000004d40)='vboxnet1\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000004dc0)='./file0\x00', &(0x7f0000004e00)) lstat(&(0x7f0000004e80)='./file0\x00', &(0x7f0000004ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004f40)) fstat(0xffffffffffffffff, &(0x7f0000004f80)) lstat(&(0x7f0000005000)='./file0\x00', &(0x7f0000005040)) getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000050c0)={{{@in=@loopback, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000051c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000005200)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000088c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000008900)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@local}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000008a00)=0xe8) lstat(&(0x7f0000008a40)='./file0\x00', &(0x7f0000008a80)) getpgid(0xffffffffffffffff) getresuid(&(0x7f0000008b00), &(0x7f0000008b40), &(0x7f0000008b80)) getgroups(0x0, &(0x7f0000008bc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000008c00)) getresuid(&(0x7f0000008c40), &(0x7f0000008c80), &(0x7f0000008cc0)) fstat(0xffffffffffffffff, &(0x7f0000008d00)) getpgid(0xffffffffffffffff) geteuid() lstat(&(0x7f0000008d80)='./file0\x00', &(0x7f0000008dc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000008e80)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000008e40)='wlan0'}, 0x30) stat(&(0x7f0000008ec0)='./file1\x00', &(0x7f0000008f00)) getresgid(&(0x7f0000008f80), &(0x7f0000008fc0), &(0x7f0000000140)) getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009040)={{{@in=@broadcast, @in=@rand_addr}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000009140)=0xe8) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000009180)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000091c0)={{{@in=@multicast2, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000092c0)=0xe8) getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000009340)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000009300)='trusted.syz\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009380)={{{@in=@dev, @in6=@local}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000009480)=0xe8) lstat(&(0x7f00000094c0)='./file0\x00', &(0x7f0000009500)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000009700), 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000580)) fcntl$getflags(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[]}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000380)={&(0x7f0000000a40)=ANY=[]}}, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000040)={0x7}, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000540)) syz_execute_func(&(0x7f0000000240)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefac403ad5c2e08660f3887302f2fe5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:34:57 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000200), &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, &(0x7f0000000240)) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000180)={0xff, 0x0, 0x2, 0xa7db, 0x10000, 0x6, 0x81, 0xffffffff, 0x0, 0x5, 0x6, 0x4}) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000440)=""/186, 0x5f5) getdents(r1, &(0x7f0000000140)=""/2, 0x450) 03:35:02 executing program 2: clock_getres(0x3, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) 03:35:02 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) getgid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8923, &(0x7f0000000100)={'tunl0\x00', @ifru_settings={0x0, 0x0, @sync=&(0x7f0000000140)}}) pipe2$9p(&(0x7f0000000480), 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@dev, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) socket(0x0, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f00000002c0)) setitimer(0x2, &(0x7f0000000100), &(0x7f0000000180)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000800)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000780)={'system_u:object_r:anacron_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x8}, 0x57) 03:35:02 executing program 3: clock_nanosleep(0x3, 0x0, &(0x7f0000000700), &(0x7f0000000500)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) futex(&(0x7f0000000640), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000140), 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe6}]}) accept(0xffffffffffffffff, &(0x7f0000000300)=@sco, &(0x7f0000000940)=0x80) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000180), &(0x7f0000000380)=0x8) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) pipe2(&(0x7f0000000080), 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000680)={0x18}, 0x18) execve(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000780), &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) setregid(0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000400), 0x8, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) 03:35:02 executing program 4: clock_getres(0x0, &(0x7f0000000880)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@rand_addr, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') getgroups(0x0, &(0x7f0000000180)) setfsgid(0x0) clock_gettime(0x0, &(0x7f0000000440)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000480)) openat$random(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x0, 0x0) getrusage(0x0, &(0x7f00000007c0)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000240), &(0x7f00000002c0)=0x6e) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f00000003c0)) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000540), &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000640)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dccec273fe1ff2380f387c366766460f38286200f081768cc800000065fdb5e5bc2b8000002167f04abab2fc000000ca6b2179dae5660fe1c06a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe230eb") 03:35:02 executing program 5: gettid() socket$packet(0x11, 0x0, 0x300) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000280)=""/125, &(0x7f0000000300)=0x7d) request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f0000000040), &(0x7f0000000180)='*#(-nodev@\x00', 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240)='rxrpc\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) getgid() syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getpid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000480)) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x0, &(0x7f0000000500)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/mnt\x00') gettid() setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) getresgid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000580)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001840)={{{@in6=@ipv4={[], [], @broadcast}, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000001940)=0xe8) getegid() 03:35:02 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) getgid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8923, &(0x7f0000000100)={'tunl0\x00', @ifru_settings={0x0, 0x0, @sync=&(0x7f0000000140)}}) pipe2$9p(&(0x7f0000000480), 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@dev, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) socket(0x0, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f00000002c0)) setitimer(0x2, &(0x7f0000000100), &(0x7f0000000180)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000800)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000780)={'system_u:object_r:anacron_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x8}, 0x57) 03:35:02 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) getgid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8923, &(0x7f0000000100)={'tunl0\x00', @ifru_settings={0x0, 0x0, @sync=&(0x7f0000000140)}}) pipe2$9p(&(0x7f0000000480), 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@dev, @in=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) socket(0x0, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, &(0x7f00000002c0)) setitimer(0x2, &(0x7f0000000100), &(0x7f0000000180)) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000800)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000780)={'system_u:object_r:anacron_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x8}, 0x57) 03:35:02 executing program 0: syz_emit_ethernet(0x0, &(0x7f0000000100)=ANY=[], 0x0) signalfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x3) memfd_create(&(0x7f0000000080)='/selinux/checkreqprot\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000700)="42805da0be0fef69dc0f01eece73fe380f382167470fe3e1f0817e768cc80000000081b5e5bc2b000000216764366766460f383bdcdae5e54175458f261ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) memfd_create(&(0x7f0000000080)='\x00', 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) geteuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000200)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@local, @in=@local}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000000f00)=0xe8) 03:35:02 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa) accept4(0xffffffffffffffff, &(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000540)=0x80, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) eventfd2(0x0, 0x0) epoll_create1(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f0000000540)='blacklist\x00', &(0x7f00000004c0), &(0x7f0000000580)='team0\x00', 0x0) syz_execute_func(&(0x7f0000000840)="42805da0bd0fef69dc0f01eece73fe19fac461796e04df3821436cf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b21790e25e5e44135450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:35:03 executing program 1: accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001580)={@local}) syz_open_procfs(0x0, &(0x7f0000000040)='children\x00') ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") mknod(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000340)=0x78) 03:35:04 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f00000004c0)) getgid() setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) eventfd(0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:04 executing program 1: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000440)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000600)) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000840)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000ec0)) fstat(0xffffffffffffff9c, &(0x7f0000000f00)) openat$uhid(0xffffffffffffff9c, &(0x7f0000002500)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000002540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pipe2(&(0x7f0000002580), 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f00000025c0), 0x0) pipe2$9p(&(0x7f0000002600), 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000002640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000002680)='syz1\x00', 0x200002, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000026c0)='/selinux/create\x00', 0x2, 0x0) syz_open_dev$rtc(&(0x7f00000051c0)='/dev/rtc#\x00', 0x0, 0x0) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000005200)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005240)) getuid() socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$binder(&(0x7f0000008780)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$rtc(&(0x7f00000087c0)='/dev/rtc#\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000008800), 0x4) epoll_create(0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000008840)='/dev/loop-control\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000008880)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000088c0)=0x1c) openat$ashmem(0xffffffffffffff9c, &(0x7f0000008900)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000008940), &(0x7f0000008980)=0xc) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f00000089c0)) accept$packet(0xffffffffffffff9c, &(0x7f0000008a00), &(0x7f0000008a40)=0x14) open$dir(&(0x7f0000008a80)='./file0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000008ac0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000008b00)=0x1c, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000008f80)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000009000)={&(0x7f0000008fc0)='./file0\x00'}, 0x10) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000009380)='cgroup.threads\x00', 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$uinput(0xffffffffffffff9c, &(0x7f00000093c0)='/dev/uinput\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000009440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000009400)='GPL\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000009480), &(0x7f00000094c0)=0xc) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f000000e540)='/dev/fuse\x00', 0x2, 0x0) epoll_create(0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f000000e580)='/selinux/status\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f000000e5c0)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f000000e600)='syz0\x00', 0x200002, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f000000e780), 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x88, &(0x7f0000000400)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:35:09 executing program 3: eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) socket$inet6_udplite(0xa, 0x2, 0x88) umount2(&(0x7f0000000580)='./file0\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000440)) socket$inet_udp(0x2, 0x2, 0x0) getrandom(&(0x7f0000000480)=""/148, 0x94, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000001c0)=':cpuset(lovmnet1cgroup}\'selinux-+wlan0:[-\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) dup(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) getpgrp(0x0) getgid() getpgrp(0x0) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) lstat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001600)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001640), &(0x7f0000001680)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001940)) getresgid(&(0x7f0000001980), &(0x7f00000019c0), &(0x7f0000001a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80), &(0x7f0000001ac0)=0xc) getpgid(0x0) getgroups(0x0, &(0x7f0000003d40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003dc0)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000003d80)='{[+ppp0^\x00', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000003e00)='./file0\x00', &(0x7f0000003e40)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f00), &(0x7f0000003f40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3420f520c25130000007f") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23e66440f55ab0000ffffd8c70b00000244be80cc39390f383065f047fe06450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:09 executing program 0: rt_sigaction(0x2f, &(0x7f0000000180)={&(0x7f0000000040)="40ded94368feefffffc481aac237b3c4c2d1bc52221b1e67643e470f763b2ef2f34110af3c000000c4c159154763458482fa7300000fe2a412ffffffff", {}, 0x0, &(0x7f0000000080)="c4a2e98e833c1c000067660f38dd0f40c13900260f6bc0c4612d68ca0fc7b3b900000098c4c249014fd90f932c9bc4227d93546bbb"}, &(0x7f00000002c0)={&(0x7f0000000200)="66420f380842a046dcfb0ff4b80a0000004201bfc1c000000f116af0f34e0f2ac9c442512ea41439a50000d9e82ef3446dc4c1655e9dfeefffff", {}, 0x0, &(0x7f0000000240)="66440f3a09e8e6c4222dae14aa2e2e670fd84306c4011973dbf58f4878c038b1c4627925ba11000000c483fd0cc8002ef342adf21d09000000c4c295ba2591000000"}, 0x8, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000004080)) recvmmsg(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0, &(0x7f00000040c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f45022e") openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000002c80)='/selinux/mls\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000002cc0)='./file0\x00', 0x0, 0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002d00)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000002e00)=0xe8) stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f00)) stat(&(0x7f0000002f40)='./file0\x00', &(0x7f0000002f80)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000033c0)) 03:35:09 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) eventfd2(0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000003440), 0x0) ioprio_set$pid(0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000009c0)='smaps\x00') sendto$unix(0xffffffffffffffff, &(0x7f0000000a00), 0x0, 0x0, &(0x7f0000000a80)=@abs, 0x6e) bind$netlink(0xffffffffffffffff, &(0x7f0000000040), 0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f00000001c0)="85643573756d5e00aad71e185ce958031ff06b0f4b49e78cfb1339acdb1ec49d1f876620e3bd0b790877e1155cd7fcb585109b678ddfbdc96695303adfc2a1a09fc9859570c67e5d1837982f55e9bb3ed13d1cad729a807059317423f4d435a4fcd8e2fd06dd8a20e16afd31e8e8e0eb0800000099418bd599c584ec514fc48704f3b5b8f821738a61e8663388cd3c7de4519c6a69327aefc69ebcc254a50452f6a08752f2602320b7a8d5d267e2197de8cd5108b8f46cc7ac94b785b16f19eabbfddda7e58beca463634aa0cf06ed", 0xcf, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000540), 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000580)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) fstat(0xffffffffffffffff, &(0x7f0000000d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b80), &(0x7f0000000d80)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000dc0), &(0x7f0000000e00), &(0x7f0000000e40)) getgroups(0x0, &(0x7f0000000e80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000ec0)) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getresgid(&(0x7f0000000fc0), &(0x7f0000001000), &(0x7f0000001040)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000010c0)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f00000011c0)=0xe8) getgroups(0x0, &(0x7f0000001200)) gettid() lstat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002840), &(0x7f0000002880)=0xc) 03:35:10 executing program 5: clock_gettime(0x200000, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000300)='syz1\x00') fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@local, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000900)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002400)) stat(&(0x7f0000002440)='./file0\x00', &(0x7f0000002480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002500), &(0x7f0000002540)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004f00), &(0x7f0000004ec0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000026c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002700)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@broadcast}}, &(0x7f0000002800)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002840)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003080)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000003180)=0xe8) stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003280)) fstat(0xffffffffffffffff, &(0x7f00000032c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003340), &(0x7f0000003380)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000033c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003400)={{{@in=@local, @in6=@local}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000003500)=0xe8) stat(&(0x7f0000003540)='./file0\x00', &(0x7f0000003580)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004ac0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004b00)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000004c00)=0xe8) stat(&(0x7f0000004c40)='./file0\x00', &(0x7f0000004c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004d40), 0x0, 0x0) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}, {0x77359400}}, &(0x7f0000000580)) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000800)=0x14) 03:35:10 executing program 4: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000580)=0xc) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000940)=0xc) getpgrp(0x0) getpgrp(0x0) syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000008c0)={0x7}, 0x7) ustat(0x0, &(0x7f0000000700)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000780)) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000380), &(0x7f00000006c0)) timer_delete(0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000740)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641c9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:35:10 executing program 1: umount2(&(0x7f00000006c0)='./file0/file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000640)={'L-', 0xf1e}, 0x28, 0x0) epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) listxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000740)=""/174, 0xae) sigaltstack(&(0x7f0000e00000/0x200000)=nil, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 03:35:10 executing program 1: inotify_init() lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000240)) getgroups(0x0, &(0x7f0000000180)) fchown(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f00000000c0)='proc:!GPL\x00', 0x0) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) sysinfo(&(0x7f0000000040)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:35:11 executing program 1: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={&(0x7f0000000140), &(0x7f0000000300)}}, &(0x7f0000000400)) timer_gettime(0x0, &(0x7f0000000480)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) rt_sigpending(&(0x7f0000000240), 0x8) inotify_init() fcntl$notify(0xffffffffffffffff, 0x402, 0x0) mlock2(&(0x7f0000009000/0x4000)=nil, 0x4000, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in=@dev, @in6}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) getresgid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in, @in=@remote}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000008c0)=0xe8) stat(&(0x7f0000000900)='./file0\x00', &(0x7f00000009c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000940)='\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@local, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000000b80)=0xe8) getresgid(&(0x7f0000000bc0), &(0x7f0000000c00), &(0x7f0000000cc0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f80)={{{@in=@broadcast, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000001080)=0xe8) getresgid(&(0x7f00000010c0), &(0x7f0000001100), &(0x7f0000001140)) gettid() geteuid() getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001180)) stat(&(0x7f00000011c0)='./file0\x00', &(0x7f0000001200)) lstat(&(0x7f0000001280)='./file0\x00', &(0x7f00000012c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e80)={{{@in=@multicast2, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@local}}, &(0x7f0000002f80)=0xe8) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003140)={{{@in=@loopback, @in6=@loopback}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000003240)=0xe8) getgid() syz_open_dev$evdev(&(0x7f0000003280)='/dev/input/event#\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000032c0)) lstat(&(0x7f0000003300)='./file0\x00', &(0x7f0000003340)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003480), 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000280)=""/37, 0x25, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:12 executing program 1: personality(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@local}}}, &(0x7f00000003c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000035c0)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f00000036c0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000003700), &(0x7f0000003740)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003780)={0x0, @loopback, @multicast1}, &(0x7f00000037c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000003940)={&(0x7f0000000080), 0xc, &(0x7f0000003900)={&(0x7f0000003800)={0x14}, 0x14}}, 0x0) 03:35:13 executing program 1: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000540), 0xc, &(0x7f0000000740)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000380)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000016c0)=""/231, 0xe7}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b80)=0x14) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000007c0)={0x10}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000440), 0xc, &(0x7f00000019c0)={&(0x7f0000001980)=@getlink={0x20}, 0x20}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) add_key$user(&(0x7f00000017c0)='user\x00', &(0x7f0000001800), &(0x7f0000001840), 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000018c0)='id_resolver\x00', &(0x7f0000001a40), &(0x7f0000001a80), 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000006c0)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x0, {0x2, 0x0, @multicast1}, 'veth1\x00'}) keyctl$link(0x8, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0), 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000280)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:35:13 executing program 1: prctl$setmm(0x23, 0x8, &(0x7f0000ffc000/0x2000)=nil) prctl$setmm(0x23, 0x9, &(0x7f0000ffc000/0x2000)=nil) 03:35:14 executing program 3: keyctl$set_reqkey_keyring(0x4, 0xffffeffffffffffb) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast2, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=@raw, &(0x7f0000000240)='GPL\x00', 0x0, 0xd2, &(0x7f0000000280)=""/210}, 0x48) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") open(&(0x7f0000000640)='./file0\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000680)) accept(0xffffffffffffffff, &(0x7f0000000280)=@alg, &(0x7f0000000200)=0x80) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f0000000440)={'broute\x00', 0x0, 0x0, 0x38, [], 0x0, &(0x7f0000000300), &(0x7f0000000380)=""/56}, &(0x7f00000004c0)=0x78) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f00000001c0)='/dev/full\x00', 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000540)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000500), 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) getpgid(0x0) 03:35:16 executing program 2: mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) personality(0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in=@loopback, @in6=@loopback}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") add_key$keyring(&(0x7f0000000780)='keyring\x00', &(0x7f00000007c0), 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000800)='id_resolver\x00', &(0x7f0000000840), &(0x7f0000000880), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000900), 0x0, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000240)=""/93) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0x0) gettid() syz_open_procfs(0x0, &(0x7f0000000440)='net/ip6_tables_matches\x00') rt_sigtimedwait(&(0x7f0000000180), &(0x7f00000003c0), &(0x7f0000000400), 0x8) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000380), 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000700)=""/71}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file0\x00'}, 0x10) accept$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000640)=0x1c) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000005c0)) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) pipe(&(0x7f00000000c0)) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000180)) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f0000000280)) 03:35:16 executing program 1: setrlimit(0xe, &(0x7f0000000200)) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000003c0)) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da08abdbd38016dfa19fa762b4242218f8978972bf0817e768cc80000000067670fbab204000000ca4b2178dae5e54175450f2e1ac46279db6752c4e1e1666f076846480703") 03:35:16 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000080)={0x5}, &(0x7f00000000c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) dup(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000500)={{0x0, @multicast1, 0x0, 0x0, 'dh\x00'}}, 0x44) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f0000000040)=0x80, 0x0) rt_sigprocmask(0x0, &(0x7f0000000580), 0x0, 0x8) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000480)=""/118) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14}, 0x14}}, 0x0) sched_setparam(0x0, &(0x7f00000001c0)) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000440)={0x18}, 0x18) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) 03:35:16 executing program 5: ustat(0xb, &(0x7f0000000140)) accept$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000280)}) accept$inet6(0xffffffffffffff9c, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f00000004c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000340)={'nat\x00'}, &(0x7f00000003c0)=0x24) getpeername$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000300)=0x1c) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00'}, 0x45c) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000180)) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x16) syz_execute_func(&(0x7f0000000080)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f21efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") rmdir(&(0x7f0000000040)='./file0\x00') 03:35:16 executing program 4: getrandom(&(0x7f0000000240)=""/148, 0x94, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uinput\x00', 0x0, 0x0) getrusage(0x0, &(0x7f0000000b00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000600)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)) 03:35:17 executing program 1: getrlimit(0xffffffffffbffffe, &(0x7f0000000040)) mkdir(&(0x7f0000a7aff6)='./control\x00', 0x0) memfd_create(&(0x7f0000000140)="76626f786e65743047504c2f836574683100", 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./control\x00', 0x0) inotify_init() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a03b6969ef69dc00d9fbf3440f6f50e20e20373790dec4e159148436370000c46199e9850e000000211a40a564a70f157a9e400f01efe5e57171f5dfdf62010d42002e660fe095000000003ef0f6585501ee31a3b786e29864f20f2b6eb4227992dd289f410f0f8084170000ae") syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@dev, @in=@remote}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000300)=0xe8) clock_gettime(0x0, &(0x7f00000009c0)) recvmmsg(0xffffffffffffffff, &(0x7f0000000980), 0x0, 0x0, &(0x7f0000000a00)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a80)={@local}, &(0x7f0000000ac0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c40)={{{@in=@multicast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in, @in6=@mcast1}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f80)={{{@in6=@remote, @in6=@local}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000001080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000010c0)={{{@in, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000011c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001200)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000001300)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in6=@loopback, @in6}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001440)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001480)={@ipv4={[], [], @remote}}, &(0x7f00000014c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001540)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001580)={0x0, @empty, @multicast2}, &(0x7f00000015c0)=0xc) getsockname(0xffffffffffffffff, &(0x7f0000001600)=@hci, &(0x7f0000001680)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000017c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001bc0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001c40)=0x14) accept4(0xffffffffffffffff, &(0x7f0000001c80)=@can, &(0x7f0000001d00)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d40)={{{@in=@multicast2, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001e40)=0xe8) 03:35:18 executing program 1: prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000140)) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000240)=ANY=[], 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000180)) pipe(&(0x7f0000000380)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'eql\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @multicast2}, @in=@remote}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000540)=0xe8) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000003c0), 0xc, &(0x7f0000000640)={&(0x7f0000000580)=@delpolicy={0x50, 0x14, 0x0, 0x0, 0x0, {{@in=@rand_addr, @in6}}}, 0x50}}, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") fstat(0xffffffffffffffff, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000040), 0xc) 03:35:20 executing program 1: socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) socket(0x0, 0x0, 0x0) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000580)=0xe8) getgroups(0x0, &(0x7f0000000a00)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001ac0)) fstat(0xffffffffffffffff, &(0x7f0000001b00)) fstat(0xffffffffffffffff, &(0x7f0000001b80)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001f80)={{{@in6=@local, @in6}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000002080)=0xe8) getgroups(0x0, &(0x7f00000020c0)) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002100)={{{@in, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000002200)=0xe8) getgid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002240), &(0x7f0000002280)=0xc) stat(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000002380)='./file0\x00', &(0x7f00000023c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002440), &(0x7f0000000200)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000024c0), &(0x7f0000002500)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002540)={{{@in=@dev, @in6=@dev}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000002640)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002680), &(0x7f00000026c0)=0xc) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002700)={{{@in6=@local, @in=@remote}}, {{}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000002800)=0xe8) getegid() getpgrp(0x0) stat(&(0x7f0000003d80)='./file0\x00', &(0x7f0000003dc0)) lstat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)) gettid() getresuid(&(0x7f0000003f00), &(0x7f0000003f40), &(0x7f0000003f80)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003fc0), &(0x7f0000004000)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004040)={{{@in6=@dev, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000004140)=0xe8) getgid() getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000080)=0xc) fstat(0xffffffffffffff9c, &(0x7f00000044c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000004980)) getresuid(&(0x7f00000049c0), &(0x7f0000005ac0), &(0x7f0000005b00)) stat(&(0x7f0000005b40)='./file0\x00', &(0x7f0000005b80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005c40)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000005c00)=',cgroup-\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005c80)={{{@in6=@local, @in=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000005d80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005dc0), &(0x7f0000005e00)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000040), &(0x7f0000005e80), &(0x7f0000005ec0)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005f00)) getuid() stat(&(0x7f0000005f40)='./file0\x00', &(0x7f0000005f80)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:35:21 executing program 1: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000400)='/dev/keychord\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)="0e21496d696d655f74797065776c616e3000", 0xffffffffffffff9c}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000400)={0x2, 0x0, @rand_addr}, 0x10) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa000, 0x0, &(0x7f0000ff6000/0xa000)=nil) munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000180)) pipe2(&(0x7f0000000040), 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0b66969ef69b0dede41ffaa322333334e41ff0f18373766460f3828523044c1b086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d5064ac1ef2832433ae5da314b706e298987b7f") setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0), 0x4) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19006d96b8fc9c90feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:21 executing program 1: syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000900)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000a00)={@dev}, &(0x7f0000000a40)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in=@loopback, @in6=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000d40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'bridge_slave_0\x00'}) accept(0xffffffffffffffff, &(0x7f0000001080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001000)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001380)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@dev, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000014c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001500), &(0x7f0000001540)=0x14) getsockname(0xffffffffffffffff, &(0x7f0000001580)=@hci, &(0x7f0000001600)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@ipv4}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001740)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001880)={0x0, @remote, @loopback}, &(0x7f00000018c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001900)={{{@in=@dev, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000001a00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005d00)={{{@in6=@dev, @in6}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000005e00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005e40)={'veth1_to_bridge\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005ec0)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000005fc0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006080)={@multicast2, @loopback}, &(0x7f00000060c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006100)={{{@in=@loopback, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000006200)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000006240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006280)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000063c0)={'syzkaller1\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000be80)={@local, @rand_addr}, &(0x7f000000bec0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000bf00)={{{@in6=@mcast1, @in6}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f000000c000)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000c040)={{{@in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f000000c140)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000c180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000c1c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f000000c2c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000c300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000c340)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f000000c440)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f000000ce40)={&(0x7f0000000580), 0xc, &(0x7f000000ce00)={&(0x7f000000c480)={0x14}, 0x14}}, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0xfffffffffffffdee, 0xfffffffffffffffa) shutdown(0xffffffffffffffff, 0x0) getgroups(0x0, &(0x7f0000000400)) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000300)=0x8cfacae6c7830ed0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="428055a063794cef301cc96b00d9dc00d95d2f8a20f2420f58410d397c2a0f0fcdae300f38212ef30f2d39c07f41df7ec326e026e001efc4a1d0567a24f00fba320aecc461cfd0cb1a1a01460f9c9cee45dfde9f") 03:35:21 executing program 3: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) munlockall() seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in=@broadcast, @in=@multicast2}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000640)=0xe8) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) getgroups(0x0, &(0x7f0000000780)) getgid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f00000008c0), 0x24, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffffd) prctl$setmm(0x23, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/enforce\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000400)=ANY=[]) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000003c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x2c) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)) getpgrp(0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000000200)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) openat$urandom(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002600), 0x0, 0x0, &(0x7f0000000680)={0x0, 0x1c9c380}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0766969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1aeef3470fb8f79f6442f77a17") getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000180), &(0x7f00000001c0)=0xc) request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080), &(0x7f0000000140)="252d6370757365745c1b00", 0xfffffffffffffffc) futex(&(0x7f0000000500), 0x0, 0x0, &(0x7f0000000880)={0x0, 0x989680}, &(0x7f0000000300), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:35:23 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x6000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f00000000c0)='posix_acl_accesssystemp\x00', 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) syz_execute_func(&(0x7f0000000600)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23417e0f6eeefa39f6eefa39f60f38302fc4a10dfbd6450f2e1ac4010d64ac1e5d31a3b7e2989f7f") add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffd) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c40)={{{@in, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000d40)=0xe8) getgid() getpgrp(0xffffffffffffffff) geteuid() getgroups(0x0, &(0x7f0000000d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000dc0)) fstat(0xffffffffffffffff, &(0x7f0000000e00)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in, @in6}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000013c0)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) getgroups(0x0, &(0x7f0000002f40)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f80), &(0x7f0000002fc0)=0x21d) getgroups(0x0, &(0x7f00000002c0)) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={@loopback}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000031c0)) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:23 executing program 1: munlockall() seccomp(0x0, 0x0, &(0x7f0000000100)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480)=""/176, 0xb0}, 0x0) getpid() fstat(0xffffffffffffffff, &(0x7f0000002b80)) getgid() getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002c00)={{{@in6=@local, @in6=@local}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f00000005c0)=0xe8) getgid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002dc0)) lstat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000002e40)) getresgid(&(0x7f0000002ec0), &(0x7f0000002f00), &(0x7f0000002f40)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000002f80)) getgroups(0x0, &(0x7f0000003040)) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_open_dev$binder(&(0x7f0000003080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f00000030c0)='/dev/uhid\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003100)) geteuid() fstat(0xffffffffffffffff, &(0x7f0000003140)) accept4$packet(0xffffffffffffffff, &(0x7f00000031c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003200)=0x14, 0x0) open(&(0x7f0000003240)='./file0\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003540)) getuid() getresgid(&(0x7f0000003580), &(0x7f00000035c0), &(0x7f0000003600)) syz_open_procfs(0x0, &(0x7f0000003640)='oom_score\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000003680)='/selinux/enforce\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f00000039c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000003a00)) socket$nl_generic(0x10, 0x3, 0x10) epoll_create(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000003a40)='/dev/rtc0\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000003a80)) openat$full(0xffffffffffffff9c, &(0x7f0000003ac0)='/dev/full\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000003b00)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000003b40)) getresuid(&(0x7f0000003b80), &(0x7f0000003c40), &(0x7f0000003c80)) lstat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000003d00)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003d80), &(0x7f0000003dc0)=0xc) getresgid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) getpgid(0x0) getuid() stat(&(0x7f0000003ec0)='./file0\x00', &(0x7f0000003f00)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000004000)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/relabel\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000004340)='cgroup.subtree_control\x00', 0x2, 0x0) memfd_create(&(0x7f0000004380)='user\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000043c0)='cpuset.memory_pressure\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000004440)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000044c0)={&(0x7f0000004480)='./file0\x00'}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000004500)='/dev/ptmx\x00', 0x0, 0x0) getpid() stat(&(0x7f0000004b40)='./file0\x00', &(0x7f0000004b80)) getresgid(&(0x7f0000004c00), &(0x7f0000004c40), &(0x7f0000004c80)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000004cc0)='/selinux/relabel\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x0, 0x0, 0x0, &(0x7f0000004d00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004d80), &(0x7f0000004dc0)=0xc) stat(&(0x7f0000004e00)='./file0\x00', &(0x7f0000004e40)) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004ec0), &(0x7f0000004f00)=0xc) stat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) socket$nl_netfilter(0x10, 0x3, 0xc) pipe2(&(0x7f0000005000), 0x0) eventfd2(0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000005040)) geteuid() getgid() gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:25 executing program 0: clock_nanosleep(0x1, 0x0, &(0x7f0000000140), 0xfffffffffffffffd) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000003600)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@local}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'dummy0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000014c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001500)={@remote, @multicast1}, &(0x7f0000001540)=0xc) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000015c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001640)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000016c0)={'team0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001840)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001940)={{{@in6, @in6}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f0000001a40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000001b80)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000020c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002100)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002180)={@rand_addr, @broadcast}, &(0x7f00000021c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002200)={{{@in=@multicast1, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000002300)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000004fc0)={@multicast1, @dev}, &(0x7f0000005000)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000005040)={{{@in=@multicast1, @in=@local}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005200)={{{@in, @in=@dev}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000005300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005480)={{{@in6, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000005580)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005600)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005700), &(0x7f0000005740)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000005780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000057c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005800)={{{@in=@multicast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000005900)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000005940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000005980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000059c0)={@multicast1, @dev}, &(0x7f0000005a00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005a40)={0x0, @loopback, @broadcast}, &(0x7f0000005a80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005ac0)={@dev}, &(0x7f0000005b00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005c00)={{{@in=@remote, @in6=@mcast1}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000005d00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000006d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006dc0)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000009880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000098c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009900)={{{@in6=@mcast2, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000009a00)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f000000b400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000b440)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000b480)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f000000b580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000b880)={{{@in6, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f000000b980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000bb00)={{{@in6, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f000000bc00)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000cdc0), 0x0, 0x0, &(0x7f000000cf40)={0x77359400}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f000000d540)={{{@in=@multicast2, @in=@local}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f000000d640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f000000d680)={@mcast1}, &(0x7f000000d6c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000e3c0)={&(0x7f00000000c0), 0xc, &(0x7f000000e380)={&(0x7f000000d700)=ANY=[]}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000003640)=""/135, &(0x7f0000003580)=0x87) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f3737440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") 03:35:25 executing program 5: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000003c0)) getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a80)="6301000040000000f0c71876992417fc3ff47d7ece486cfcca14c65f63707573000cc3be522d98a463", 0x0, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000008c0)={0x18}, 0x18) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getpid() ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) syz_open_procfs(0x0, &(0x7f00000006c0)='Z?tLhci\x00') ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) pipe2(&(0x7f0000000180), 0x0) rt_sigprocmask(0x0, &(0x7f0000000140), 0x0, 0x8) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) pipe2(&(0x7f0000000040), 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000440), 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) statfs(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000700)=""/106) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@broadcast, @multicast1}, &(0x7f0000000780)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da08abdbd38016dfa19fa762b4242218f8978972bf0817e768cc80000000067670fbab204000000ca4b2178dae5e54175450f2e1ac46279db6752c4e1e1666f076846480703") 03:35:25 executing program 4: futex(&(0x7f00000015c0), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000004c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001cc0)={{{@in=@local, @in=@multicast2}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001980)=0xe8) stat(&(0x7f00000019c0)='./file0\x00', &(0x7f0000001bc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001dc0)={{{@in6=@local, @in6=@mcast2}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001ec0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f00)={{{@in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000002000)=0xe8) getuid() geteuid() lstat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) getresuid(&(0x7f0000002100), &(0x7f0000002140), &(0x7f0000002180)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000021c0), &(0x7f0000002200)=0xc) setxattr$system_posix_acl(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)='system.posix_acl_default\x00', &(0x7f0000002240), 0x24, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0), 0xc, &(0x7f0000000400)={&(0x7f0000001cc0)=ANY=[]}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000180), 0x0) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000005c0)=""/4096, 0x1000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000480)) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000001740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001780)={{{@in=@local, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000001880)=0xe8) stat(&(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)) geteuid() getgid() fstat(0xffffffffffffffff, &(0x7f0000001c40)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:25 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xfefffffffffffffc) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000300)) memfd_create(&(0x7f0000000080)='/dev/full\x00', 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000280)) getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010407031dfffd946fa2830020200a0009000100031d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 03:35:26 executing program 1: madvise(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0110fef69dc0fc201e5eeff0faa0faa37c4427d7838c8c19086d9f28fc9664f0f3a61780071c421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafedd7f") openat$keychord(0xffffffffffffff9c, &(0x7f0000000240)='/dev/keychord\x00', 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) 03:35:27 executing program 1: sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f00000004c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='IPVS\x00', 0xffffffffffffff9c}, 0x10) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000640)={0x7}, 0x7) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffe7f}, 0xfffffffffffffec7) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000500)={@remote}, 0x20) seccomp(0x0, 0x0, &(0x7f0000000540)={0x0, &(0x7f0000000480)}) memfd_create(&(0x7f0000000280)='IPVS\x00', 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000200)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) pwritev(0xffffffffffffffff, &(0x7f0000f50f90), 0x0, 0x0) pkey_alloc(0x0, 0x0) getpgrp(0x0) getpgid(0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000010c0)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000001080)="6b657972696e676b3a656d30f72100"}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000012c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001300)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001340)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000016c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001700)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001740), &(0x7f0000001780)=0xc) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000017c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002f80), &(0x7f0000002fc0)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000004540)) gettid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004580)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004c40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000004c00)='/dev/loop#\x00'}, 0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") accept$inet(0xffffffffffffffff, &(0x7f00000008c0)={0x2, 0x0, @remote}, &(0x7f0000000900)=0x10) syz_execute_func(&(0x7f0000000340)="42805da0d142f753a30f01ee660f3a628600088041cb913591913d0629003e67430fd42c9678993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:27 executing program 1: clone(0x800004, 0x0, 0xfffffffffffffffe, &(0x7f00000003c0), 0xffffffffffffffff) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0), 0x3f5) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000780)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000500)=""/135, &(0x7f00000005c0)=0x87) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000006980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) mlock(&(0x7f0000d8b000/0x2000)=nil, 0x2000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000d8d000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in6}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700), 0x4) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000340)=""/50, 0x32, 0x0, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10) chown(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) sysinfo(&(0x7f0000006880)=""/193) recvmmsg(0xffffffffffffffff, &(0x7f0000002500), 0x0, 0x0, &(0x7f0000002540)) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000900)) openat(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000980)={0x7}, 0x7) mknod(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000066c0), 0x0, 0x0) getgroups(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:35:28 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x0) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000000c0), 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000880)={&(0x7f0000000480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0xfffffffffffffe96, &(0x7f0000000780), 0x0, &(0x7f0000000800)=""/84, 0x54}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in=@rand_addr, @in6}}, {{}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:35:29 executing program 1: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a06b6969ef69dc00d99069203737c3397c44060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ec31a3b786e2989f3f") recvmsg(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000000480)=""/169, 0xa9}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000540)) utimes(&(0x7f0000000080)='./file1\x00', &(0x7f0000000240)={{0x0, 0x7530}, {0x0, 0x7530}}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001500)) removexattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)=ANY=[]) socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000015c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000580), 0xc, &(0x7f0000001640)={&(0x7f0000001600)=ANY=[]}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000600)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000016c0)=0x14, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000683ff4)={@loopback, @multicast2}, 0x16) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") truncate(&(0x7f00000002c0)='./file0\x00', 0x0) syz_execute_func(&(0x7f0000001bc0)="66440fd51e0feffadc00d9ce41ff0f1837440f5e9464070000000f38211ac4e1785298f2ff7f20c19086d9f28fc90fede54e2179fb71c5e50fe50f45660fe55895c4010d64ac1e5d31a3b7069f7f") 03:35:31 executing program 2: timer_create(0x0, &(0x7f0000000040)={0x0, 0x3, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) getpgrp(0xffffffffffffffff) getpgrp(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000280)) getpgid(0x0) getpgrp(0xffffffffffffffff) getpgid(0x0) ptrace(0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) munlockall() ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000700)=""/4096) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:31 executing program 1: removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[]) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0d10fef69dc0f01ee660f3a608600088041cb35919149060e0a00000ff38323980feefa6b21798f4810866a00debae5e5e575450f2e1a3828c4220d39cba20fc77112c4633d5d8e030000004b7f") pause() removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='trusted.overlay.redirect\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) socket$nl_route(0x10, 0x3, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000480)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) pipe2$9p(&(0x7f00000004c0), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0xffffffffffffffff}, 0xc) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000540)) signalfd4(0xffffffffffffffff, &(0x7f0000000f00), 0x8, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/access\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x0, 0x0) inotify_init1(0x0) timerfd_create(0x0, 0x0) inotify_init() socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000680)) syz_open_dev$binder(&(0x7f00000006c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000700)='cpuset.mem_exclusive\x00', 0x2, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/enforce\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000780)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/validatetrans\x00', 0x1, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000800)='/dev/uhid\x00', 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/relabel\x00', 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000880)) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f00000008c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) geteuid() getgroups(0x0, &(0x7f0000000980)) socket$nl_xfrm(0x10, 0x3, 0x6) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000a40), 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000a80)='ns/cgroup\x00') openat$keychord(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/keychord\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/loop-control\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/ppp\x00', 0x0, 0x0) 03:35:33 executing program 0: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffb) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) inotify_init() clock_gettime(0x0, &(0x7f0000000540)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000340)) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000300), 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000480)=""/161, 0xa1) syz_execute_func(&(0x7f00000000c0)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410f33eefafa2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:34 executing program 5: times(&(0x7f0000000040)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@dev, @in6=@loopback}}, {{@in6=@dev}}}, &(0x7f0000000640)=0xe8) getegid() getpid() getgid() openat$uhid(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uhid\x00', 0x0, 0x0) accept4(0xffffffffffffff9c, &(0x7f00000006c0), &(0x7f0000000740)=0x80, 0x0) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@ipv4={[], [], @remote}, @in6=@remote}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000c00)=0xe8) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@local}}, &(0x7f0000000d80)=0xe8) getegid() syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000dc0)='ns/ipc\x00') openat$uinput(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000e40)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000e80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000011c0)={{{@in6, @in=@rand_addr}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f00000012c0)=0xe8) getgroups(0x0, &(0x7f0000001300)) syz_open_procfs$namespace(0x0, &(0x7f0000001340)='ns/mnt\x00') gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000014c0)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000015c0)=0xe8) getgroups(0x0, &(0x7f0000001600)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000002b80)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:35:34 executing program 3: clock_gettime(0xffbfffffffff7ff8, &(0x7f0000000140)) pipe(&(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:35:34 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='sit0\x00', 0xfffffffffffffdca) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) getuid() getpid() syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[]}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) syz_genetlink_get_family_id$team(&(0x7f00000009c0)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'syz_tun\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000a40)={{{@in6=@local, @in6}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c40)={{{@in6=@dev, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@loopback}}, &(0x7f0000000d40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d80)={{{@in=@multicast1, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000e80)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001080)={&(0x7f0000000980), 0xc, &(0x7f0000001040)={&(0x7f0000000ec0)=ANY=[]}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) add_key(&(0x7f00000004c0)='.request_key_auth\x00', &(0x7f0000000500), &(0x7f0000000540), 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0), 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'bridge_slave_1\x00'}) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000340)=""/94, 0x5e, 0x0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000880)={0x7}, 0x6) setxattr$trusted_overlay_opaque(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='trusted.overlay.opaque\x00', &(0x7f0000000940)='y\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000840)=0xe8) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000540)) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000700)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000600)=""/246, 0xf6}, 0x120) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440), 0x0, 0x0, 0xfffffffffffffffa) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:35:34 executing program 4: getcwd(&(0x7f0000000040)=""/188, 0xbc) fcntl$getown(0xffffffffffffffff, 0x9) setpgid(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000300)={{0x2, 0x0, @remote}, {0x0, @dev}, 0x0, {0x2, 0x0, @local}, 'vlan0\x00'}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000280)) eventfd2(0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfc443454ca91f000000889f7f") ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f00000002c0)={'bridge0\x00'}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:34 executing program 1: accept4(0xffffffffffffff9c, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:35:35 executing program 1: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000008c0)=0xc) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001a40)) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0), 0x0) getresgid(&(0x7f0000001b00), &(0x7f0000001b40), &(0x7f0000001b80)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000001100)) openat$rtc(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/rtc0\x00', 0x0, 0x0) eventfd2(0x0, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000001d00)='/selinux/avc/hash_stats\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001d80)={{{@in6=@remote, @in=@multicast2}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000001e80)=0xe8) getgroups(0x0, &(0x7f0000001ec0)) signalfd(0xffffffffffffff9c, &(0x7f0000001f00), 0x8) accept$packet(0xffffffffffffffff, &(0x7f0000001f40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001f80)=0x14) openat(0xffffffffffffffff, &(0x7f0000001fc0)='./file0\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000002000)='/dev/keychord\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002040)) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) getgroups(0x0, &(0x7f0000002140)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) openat$urandom(0xffffffffffffff9c, &(0x7f0000002180)='/dev/urandom\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000021c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000002200)='/selinux/access\x00', 0x2, 0x0) getpid() getresuid(&(0x7f0000002440), &(0x7f0000002480), &(0x7f00000024c0)) fstat(0xffffffffffffff9c, &(0x7f0000002500)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000002580)='cgroup.type\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000025c0)=@raw, &(0x7f0000002640)='syzkaller\x00', 0x0, 0x5f, &(0x7f0000002680)=""/95}, 0x48) syz_open_dev$sndtimer(&(0x7f0000001000)='/dev/snd/timer\x00', 0x0, 0x0) epoll_create(0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000027c0), 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ion\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002840)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002880)={{{@in=@remote, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000002980)=0xe8) getresgid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) getpid() getresuid(&(0x7f0000002a80), &(0x7f0000002ac0), &(0x7f0000002b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b40), &(0x7f0000002b80)=0xc) openat$ptmx(0xffffffffffffff9c, &(0x7f0000002bc0)='/dev/ptmx\x00', 0x0, 0x0) epoll_create1(0x0) accept(0xffffffffffffff9c, &(0x7f0000002c00)=@vsock, &(0x7f0000002c80)=0x80) socket$inet6_udplite(0xa, 0x2, 0x88) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x12, &(0x7f00000002c0)='^posix_acl_access\x00'}, 0x30) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f40), 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/70) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/198, 0xc6, 0x0, &(0x7f0000000900)=@abs, 0x6e) 03:35:36 executing program 1: perf_event_open(&(0x7f00000001c0)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='eth0ppp1\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@broadcast, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'rose0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)={@rand_addr, @broadcast}, &(0x7f0000000a40)=0xffffffffffffffce) getsockname$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000009c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000d40)={@ipv4={[], [], @dev}}, &(0x7f0000000d80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000dc0)={0x0, @local, @remote}, &(0x7f0000000e00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f00)={@remote, @remote}, &(0x7f0000000f40)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000010c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in=@loopback, @in=@local}}, {{@in=@multicast2}}}, &(0x7f0000001200)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001280)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000012c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@dev, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000014c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001a80)=0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000001dc0), 0x0, 0x0, &(0x7f0000001e00)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001e40)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @dev, @multicast2}, &(0x7f0000001f40)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000023c0)={@empty, @multicast1}, &(0x7f0000002400)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002500)={0x0, @loopback, @multicast2}, &(0x7f0000002540)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002640)={0x0, @local, @dev}, &(0x7f0000002680)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000026c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002700)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000002840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002880), &(0x7f00000028c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002a00)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002a80)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002ac0), &(0x7f0000002b00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000003480)={&(0x7f0000000480), 0xc, &(0x7f0000003440)={&(0x7f00000034c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)=""/14, &(0x7f00000006c0)=0xe) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0xfffffffffffffff4) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) getsockname(0xffffffffffffffff, &(0x7f00000004c0)=@hci, &(0x7f0000000640)=0x80) socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:36 executing program 1: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000003d80)) recvmmsg(0xffffffffffffffff, &(0x7f0000003c00), 0x0, 0x0, &(0x7f0000003dc0)) recvmmsg(0xffffffffffffffff, &(0x7f0000006e40), 0x0, 0x0, 0x0) getuid() openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) getpeername(0xffffffffffffffff, &(0x7f0000000e40)=@nl, &(0x7f0000000300)=0x32e) accept4$unix(0xffffffffffffff9c, &(0x7f00000003c0), &(0x7f0000000140)=0x6e, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200), 0x4) dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) geteuid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) 03:35:37 executing program 1: pselect6(0x40, &(0x7f0000003380), &(0x7f0000003300), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000880)={&(0x7f0000000840), 0x8}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000003100), &(0x7f0000000080)=0xfffffffffffffed9, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000031c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x19, &(0x7f0000000200)='system.posix_acl_default\x00'}, 0x30) getpriority(0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/avc/hash_stats\x00', 0x0, 0x0) geteuid() geteuid() getresuid(&(0x7f0000000a40), &(0x7f0000000c00), &(0x7f0000000a80)) lstat(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000c40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@broadcast, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getgid() getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) getgroups(0x0, &(0x7f0000000940)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000340)=0xc) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f00000002c0), &(0x7f0000000300)=0x8) getgid() getgroups(0x0, &(0x7f0000000a80)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000b00)=ANY=[], 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/mls\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="52805da0990fef69dc2e3e7b0fe48adf4b51ce51da6ff002ff380f38211af3f081a4768c23ca0000a08081b5b5470f624485cc2167f00fbab204000000ca63ae79dae5e5c461d95969f145450f71f5fbc4010d64ac1e5d31a3b744cc230fd99e0c000000e14ba5") 03:35:38 executing program 2: getrusage(0x0, &(0x7f0000000ac0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000cc0)={{{@in6=@mcast2, @in6}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f0000000dc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e00), &(0x7f0000000e40)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@loopback}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) getuid() fstat(0xffffffffffffffff, &(0x7f00000003c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@multicast1, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f00000006c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) geteuid() getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000ac0)=ANY=[], 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:35:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_buf(r0, 0x1, 0x22, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x10) 03:35:38 executing program 0: clock_getres(0xffffffffffffffff, &(0x7f0000000340)) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000400)=""/234, 0xea, 0x0, &(0x7f0000000240)={0x2, 0x0, @remote}, 0x10) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000340)}) fsetxattr(0xffffffffffffffff, &(0x7f0000000300)=@random={'btrfs.', '/dev/ppp\x00'}, &(0x7f0000000500)='selinuxeth0\x00', 0xc, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") write$cgroup_type(0xffffffffffffffff, &(0x7f0000000540)='threaded\x00', 0x9) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000040)) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000640)=""/210, 0xd2, 0x0, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000740)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000002c0)=0x4) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000080)}) write$nbd(0xffffffffffffffff, &(0x7f0000000800), 0x10) 03:35:39 executing program 5: rt_sigpending(&(0x7f00000012c0), 0x8) r0 = syz_open_dev$rtc(&(0x7f0000001180)='/dev/rtc#\x00', 0x2, 0x20002) write(r0, &(0x7f00000011c0)="f1000000", 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000100)=0x3, 0x4) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000001740)=ANY=[@ANYBLOB="12585c802f03b73b98abfa9e3b72a8628a130226ef3ad16bc89a369f2b79fc7edc1266462f9d0df05b112c1f5c95bf006559231ab1a74609df7c41fd2dafbc20db8fa416d25cafb2325ed10f91d6c5d0bee278c7df666eb042964907efc5e054361e6c2bdf6db116a5ca7a5f530c56aa90e374ff1d8eee755ecd123290e801e6c65264d293b47959a94570720ee4a9"], 0x8f) getsockopt$inet6_buf(r2, 0x29, 0x36, &(0x7f0000000180)=""/4096, &(0x7f0000000000)=0x1000) fcntl$getownex(r1, 0x10, &(0x7f0000001500)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001800)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001540)=0xe8) stat(&(0x7f0000001580)='./file1\x00', &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000015c0)={r3, r4, r5}, 0xc) pwritev(r1, &(0x7f00000016c0)=[{&(0x7f0000001600)="4c79aa5e59d79595d94ce513b607b5c269076ebfae1188a34812c1ec56550e72a7578d843a741a9885f6d769ac7a19300ac5a48bd783e85d0c0b0b27764ba1a6bb409932513c9384c925fbdb67b25d3cffeb4bb18aeb209dee692aef60dcb2b0d42518fb83efbcc2a8464eee396c471120861d772e3772486d68f40e960998ad76057c85e1", 0x85}], 0x1, 0x0) flistxattr(r0, &(0x7f0000001200)=""/158, 0x9e) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x4) write$selinux_create(r6, &(0x7f0000001980)=ANY=[@ANYBLOB="737973744e0b4746cfd8656d5f753a6f626a6563745f723a379a50e0c0278b9738f5a9df7b7373685f657865635f0000010000000000612f7362696e2f6375707364203030303030303030305330303030303635353335202e2f66696c653000"], 0x60) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000000c0)={0xfffffffffffffffa, 0x400, 0x2, 0x7}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000140)=[{0x4, 0x8}, {0x4, 0x4000000000000000}, {0x3}, {0x3, 0x330a}, {0x8, 0x5}], 0x5) openat$full(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/full\x00', 0x202000, 0x0) unshare(0x40000000) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(r6, &(0x7f0000001400)=@abs, &(0x7f0000000080)=0x6e) ioctl$sock_inet_SIOCRTMSG(r6, 0x890d, &(0x7f0000001340)={0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x14}}, {0x2, 0x4e22, @rand_addr=0x9}, {0x2, 0x4e21, @multicast1}, 0x4, 0x1, 0x0, 0x80000001, 0x6, &(0x7f0000001300)='eql\x00', 0x1, 0x101, 0x91f3}) 03:35:39 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) open(&(0x7f0000000140)='./file0\x00', 0x410902, 0x0) 03:35:39 executing program 1: futex(&(0x7f0000000440), 0xfffffffffffffffe, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getflags(0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x0, 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)=""/88, 0x58) clock_gettime(0x0, &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x0, 0x0) getpid() getresgid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000ac0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000b00)) getgroups(0x0, &(0x7f0000000b40)) getpgid(0x0) getgroups(0x0, &(0x7f0000000b80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001200)) getresgid(&(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001300), &(0x7f0000001340)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000000800)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001440)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getresgid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000019c0)={&(0x7f0000001980)='system\x00'}, 0x10) gettid() getresgid(&(0x7f0000001a00), &(0x7f0000001a40), &(0x7f0000001a80)) getpid() getresgid(&(0x7f0000003180), &(0x7f00000031c0), &(0x7f0000003200)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003240)) syz_execute_func(&(0x7f0000000340)="c4a1b57d023ef245abc401245cb00a00000066430f3a226006b10f71f400c4c3f12296ef0d2dabfec4e2f92081a3c001480b56ffc4e139f8d4c4c1fd110480") 03:35:39 executing program 4: getpid() fcntl$getown(0xffffffffffffff9c, 0x9) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:35:39 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000001680), &(0x7f0000000500)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000640)="1cd2805da06922692295d3200f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b217973e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") rt_sigpending(&(0x7f00000001c0), 0x8) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") 03:35:39 executing program 1: getrandom(&(0x7f0000000200)=""/148, 0x340, 0xfffffffffffffffc) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) io_setup(0x0, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:35:40 executing program 1: timer_create(0x0, &(0x7f0000000280)={0x0, 0x16, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000002c0)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ff0000/0x1000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000600)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) getpeername$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs, &(0x7f0000000540)=0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 03:35:40 executing program 1: setitimer(0x2, &(0x7f0000000640), 0x0) eventfd(0x0) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) open(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f0000000400), &(0x7f0000000440)='wlan1em1em1cgroup\x00', 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da07e0fef69dc644f1750710000ce0ecf4130410f3805de660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac7d5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:35:41 executing program 1: getpgid(0x0) seccomp(0x1, 0x0, &(0x7f00000008c0)={0x1, &(0x7f0000000900)=[{0x4000000000000006, 0x0, 0x0, 0x58fe7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001b80)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001c40)='/proc/self/net/pfkey\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000800)=@abs, &(0x7f0000000880)=0x6e) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000580)) syncfs(0xffffffffffffffff) memfd_create(&(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000001c0)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f00000007c0)=0x1c) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000480)={0x0, {{0x2, 0x0, @rand_addr}}}, 0x218) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000540)='teql0\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000006c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000440)=0xe8) ioprio_set$uid(0x0, 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000700)=""/139, &(0x7f00000005c0)=0x8b) accept$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) 03:35:45 executing program 2: chmod(&(0x7f0000000280)='.\x00', 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000240)) getpgid(0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000000c0), 0x14) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f00000003c0)={0x7}, 0x7) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000400)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f00000002c0)}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @remote}, 0xc) syz_execute_func(&(0x7f0000000800)="42805da0d10fef69dc0f01ee660f3a608600088041cba1d9cb3591913d06927899c4c185f64a000feefae8ed0a660fc4c19815ff2f8f09d898d5450f2e1a3828660f3831f5159f7f") 03:35:45 executing program 0: getuid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:35:45 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) dup(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) sendto(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) getpgid(0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000140)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, {0xa, 0x0, 0x0, @local}}, 0x5c) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") 03:35:53 executing program 5: recvfrom$inet(0xffffffffffffffff, &(0x7f0000000980)=""/139, 0x8b, 0x0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=@random={'trusted.', '(system:/\x00'}, &(0x7f0000000540)='bpq0\x00', 0x5, 0x0) prctl$getname(0x10, &(0x7f0000000640)=""/71) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/status\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1aa128c44379dfb9d6adbe90dfe2989f7f") getuid() lstat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000400)) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000800)={0x0, {}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)='bpq0\x00'}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='statm\x00') ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000002c0)) getgid() accept$inet6(0xffffffffffffffff, &(0x7f00000005c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000600)=0x1c) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000500)) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) 03:35:53 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x20000, 0x0) openat(0xffffffffffffffff, &(0x7f0000000480)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000140)=""/244) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)={@dev}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b80)={{{@in=@broadcast, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000640)=0x34a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000002c0)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}, 0x5c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getresuid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[]}}, 0x0) getgid() lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) getegid() fstat(0xffffffffffffffff, &(0x7f0000000940)) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) getgid() syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:35:53 executing program 4: close(0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000840)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d065d628bfa29008bfa29003d233d23410feefa6339c4c1795aee660f38302fbae5e5e575450f2e1af0442975e1c43279dfb9d6adbe90dfe2989f567f") 03:35:53 executing program 1: times(&(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) 03:35:53 executing program 0: getrusage(0x0, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getrusage(0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000004c0)=0x10) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[]}}, 0x0) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1}, 0xc) openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005400)={{{@in=@multicast2, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xfffffd37) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000640)='\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000006c0)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000020c0)) getpgid(0x0) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000019c0)) getgroups(0x0, &(0x7f0000000e00)) getpid() stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000600)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001900)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001980)) getegid() pipe2(&(0x7f0000002100), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003f00)) getgid() getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f40), &(0x7f0000003f80)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000044c0)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000004480)='/dev/keychord\x00'}, 0x30) getgroups(0x0, &(0x7f0000000dc0)) getpid() fstat(0xffffffffffffffff, &(0x7f0000004540)) getpgrp(0x0) lstat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000004600)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004dc0)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000004d80)='nbd\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000004e40)) getpid() lstat(&(0x7f0000004ec0)='./file0\x00', &(0x7f0000004f00)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003ac0), 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000140)=""/54) 03:35:53 executing program 2: getpid() syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') getegid() getegid() lstat(&(0x7f0000000880)='./file0/file0\x00', &(0x7f0000000780)) getuid() setxattr$system_posix_acl(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='system.posix_acl_access\x00', &(0x7f0000000640), 0x24, 0x0) getresgid(&(0x7f00000002c0), &(0x7f0000000180), &(0x7f00000001c0)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000600), 0x0) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000300)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000380)='keyring\x00', &(0x7f0000000440), &(0x7f0000000480)='+-(\x00', 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100), &(0x7f00000002c0), 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), 0xc) seccomp(0x1, 0x0, &(0x7f0000000740)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:35:54 executing program 1: sched_setaffinity(0x0, 0xfffffffffffffeac, &(0x7f0000004440)=0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000340)=0xc) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000480)=""/29, &(0x7f00000004c0)=0x1d) gettid() gettid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000400)) getpgid(0xffffffffffffffff) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), &(0x7f0000000040)=0xa) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f00000005c0)) getgroups(0x0, &(0x7f0000000340)) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000540)) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), 0xffffffffffffffc2) accept$inet6(0xffffffffffffff9c, &(0x7f0000000180)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) clock_adjtime(0x0, &(0x7f0000004480)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000003c0), 0x4) io_setup(0x0, &(0x7f0000000500)) accept4(0xffffffffffffffff, &(0x7f0000000080)=@un=@abs, &(0x7f0000000140)=0x80, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000580)) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ptrace$getenv(0x4201, 0x0, 0x0, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'bridge_slave_1\x00', {0x2, 0x0, @local}}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:35:55 executing program 1: wait4(0x0, &(0x7f0000000140), 0xfffffffffffffffe, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) setpriority(0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0\x00', 0x8, 0x0) getgid() mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000080)='memory.stat\x00'}, 0x30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e09d26d44c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205f3420f1beb7b7f") 03:35:56 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@multicast1, @multicast1}, &(0x7f0000000180)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x14) 03:35:57 executing program 1: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:35:58 executing program 1: unshare(0x0) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000002c0)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000600)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000580)={'nr0\x00'}) pipe(&(0x7f0000000140)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) prctl$intptr(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) accept4(0xffffffffffffff9c, &(0x7f0000000180)=@xdp, &(0x7f0000000200)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000880)={0x0, @local, @multicast1}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000a00)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000b00)=@hci, &(0x7f0000000b80)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in=@multicast1}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000d80)=0xfffffe73) syz_execute_func(&(0x7f0000000500)="42805da0c267670f926f0046dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f08302f3e26f043108900000000450f2e628af5c4a1ff741c3f04d6adbe8adfe2c5c4617c5b95504c00007e") getpgid(0xffffffffffffffff) gettid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000c40)) getgid() gettid() fstat(0xffffffffffffffff, &(0x7f0000005280)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000005400)={&(0x7f0000000a40)=@proc, 0xc, &(0x7f0000005200), 0x0, &(0x7f0000005300)}, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) inotify_init() write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000780), 0x0) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040)) creat(&(0x7f0000000180)='./file0\x00', 0x0) 03:35:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getegid() link(&(0x7f00000027c0)='./file0\x00', &(0x7f0000002800)='./file0\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001640), 0x0, &(0x7f00000016c0)}, 0x0) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:36:00 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x82000, 0x0) close(r0) 03:36:00 executing program 3: keyctl$set_reqkey_keyring(0x7, 0x200000006) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000000980)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() pipe2$9p(&(0x7f0000000a40), 0x0) perf_event_open(&(0x7f0000006140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000006100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000062c0), 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@loopback}, &(0x7f0000000440)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) getgid() seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x0, &(0x7f0000000080)) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) syz_emit_ethernet(0x0, &(0x7f0000000040)=ANY=[], &(0x7f0000000080)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:36:00 executing program 1: mount(&(0x7f0000000600)=@nullb='/dev/nullb0\x00', &(0x7f0000000580)='./file0\x00', &(0x7f0000000440)='reiserfs\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) utime(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)}) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000600)) pipe2$9p(&(0x7f0000000040), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") eventfd(0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)}) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000440), 0x12) bind$unix(0xffffffffffffffff, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0xffffffffffffff30) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000300)) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000340)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:36:00 executing program 4: futex(&(0x7f0000000280), 0x5, 0x0, &(0x7f00000000c0)={0x0, 0x1c9c380}, &(0x7f0000000040), 0x0) clock_gettime(0x0, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380), 0x4) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)='cgroup.subtree_control\x00', 0x2, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/status\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000580)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000005c0)) syz_open_dev$rtc(&(0x7f0000000600)='/dev/rtc#\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)={&(0x7f0000000640)='./file0/file0\x00'}, 0x10) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0xd14b, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000180), &(0x7f0000000200)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000015c0)={{{@in=@dev}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000240)=0xe8) getresuid(&(0x7f0000002940), &(0x7f0000002980), &(0x7f00000029c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000002b00)=0xe8) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006280)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000006240)='-.-&\'%^em0ppp1\x00'}, 0x30) getpgrp(0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000003c0)=""/160) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000065c0)) lstat(&(0x7f0000006600)='./file0\x00', &(0x7f0000006640)) getgroups(0x0, &(0x7f00000066c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006700)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006740)={{{@in6=@dev, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000006840)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006880)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da00d6564f3656643dbea640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5dc331a3b7b74379dfb9d6adbe90dfe2989f3f") 03:36:00 executing program 0: clock_nanosleep(0x40, 0x0, &(0x7f0000000600), &(0x7f00000005c0)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='vlan0\x00'}, 0xfffffe8a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000009c0)='./file0/file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000bc0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getpgid(0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f0000000a80)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000b00)='team\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d00)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000980)='sessionid\x00'}, 0xfffffffffffffe01) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000d40)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000006c0)) fchmod(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe2}]}) syz_execute_func(&(0x7f0000000280)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:36:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000200)='./bus\x00', 0x0) fstatfs(r1, &(0x7f0000001740)=""/4096) 03:36:01 executing program 1: clock_getres(0x0, &(0x7f0000000280)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@dev, @in=@multicast2}}}, &(0x7f0000000240)=0xe8) getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@remote, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in=@multicast1, @in6=@local}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000000c0)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f0000000140)) getgroups(0x0, &(0x7f0000000940)) getresgid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) fstat(0xffffffffffffffff, &(0x7f0000000a40)) getegid() lstat(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 03:36:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) fallocate(r0, 0x1, 0x0, 0x10000101) 03:36:02 executing program 1: sysinfo(&(0x7f0000000780)=""/20) nanosleep(&(0x7f00000000c0)={0x0, 0x1c9c380}, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000240)) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000600), 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) getgid() getgroups(0x0, &(0x7f00000003c0)) fstat(0xffffffffffffff9c, &(0x7f0000000400)) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000005c0), 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000004c0)=0x14) readv(0xffffffffffffffff, &(0x7f00000007c0), 0x10bd) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000480), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:36:03 executing program 1: setpriority(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=@raw, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x41, &(0x7f0000000240)=""/65}, 0x48) clock_gettime(0x0, &(0x7f0000006100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:04 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) pipe2(&(0x7f00000002c0), 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000840), &(0x7f00000008c0)=0x6e) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000940), 0x4) socket$inet6(0x10, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x1, 0xc, 0x2009, 0x20000000000001, 0x0, 0x0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @multicast2}, 0x10) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in=@dev, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000980)=0xe8) lstat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)) gettid() geteuid() getgroups(0x0, &(0x7f0000000a80)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000bc0)=0xe8) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001680), &(0x7f00000016c0)=0xc) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001700)) fstat(0xffffffffffffffff, &(0x7f0000001740)) getegid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() lstat(&(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001d80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001dc0), &(0x7f0000001e00)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001ec0)) getgid() getpgid(0x0) geteuid() lstat(&(0x7f0000001f80)='./file0\x00', &(0x7f0000001fc0)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002080), &(0x7f00000020c0)=0xc) getpid() geteuid() lstat(&(0x7f0000002100)='./file0\x00', &(0x7f0000002140)) getresuid(&(0x7f0000002240), &(0x7f0000002280), &(0x7f00000022c0)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000026c0)) geteuid() getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002740)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in=@rand_addr}}}, &(0x7f0000002840)=0xe8) stat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002940)) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002980), &(0x7f00000029c0)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002a00)) fstat(0xffffffffffffffff, &(0x7f0000002a40)) getgroups(0x0, &(0x7f0000002ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002b00)) getresuid(&(0x7f0000002b40), &(0x7f0000002b80), &(0x7f0000002bc0)) fstat(0xffffffffffffffff, &(0x7f0000002c00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002c80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:36:05 executing program 5: clock_gettime(0x4, &(0x7f0000000300)) socket$packet(0x11, 0x0, 0x300) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003580), 0x213, 0x0, &(0x7f0000000080)={0x0, 0x1c9c380}) bind(0xffffffffffffffff, &(0x7f0000000340)=@ethernet, 0x80) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000006c0)) getpid() geteuid() stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)) getresuid(&(0x7f00000001c0), &(0x7f00000005c0), &(0x7f0000000600)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f00000000c0)) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:36:07 executing program 3: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x81, 0x2001) fcntl$dupfd(0xffffffffffffffff, 0x1, 0xffffffffffffffff) splice(0xffffffffffffffff, &(0x7f0000000080), 0xffffffffffffffff, &(0x7f00000000c0), 0x1, 0x0) r0 = inotify_init1(0x0) syz_open_dev$loop(&(0x7f0000002a80)='/dev/loop#\x00', 0xffff, 0x20000) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)=0x8000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) sendto$inet(r1, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) stat(&(0x7f0000002c40)='./file0\x00', &(0x7f0000002c80)) fcntl$setstatus(r0, 0x4, 0x40000) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000fa4000)) fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x4082) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'veth1\x00', 0x4}, 0x18) r2 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) gettid() ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000002c0)={0x0, 0x3, 0x70000, 0x4, 0x82d, 0x6e371b8c}) socket$nl_route(0x10, 0x3, 0x0) 03:36:07 executing program 1: clock_getres(0x9e010000, &(0x7f0000000200)) pipe2(&(0x7f0000000180), 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0), 0x12) clock_gettime(0x0, &(0x7f0000000140)) futex(&(0x7f0000000040), 0x0, 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) getpgid(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:36:08 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:36:09 executing program 0: memfd_create(&(0x7f0000000240)='autogroup\x00', 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000002c0)=0x6e, 0x0) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) getpgrp(0x0) getuid() getgroups(0x300, &(0x7f0000001a00)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001a40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001a80)={{{@in6=@local, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000001b80)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001bc0), &(0x7f0000001c00)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001c40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001c80)={{{@in=@loopback, @in=@remote}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001d80)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000001dc0)) inotify_init() accept$unix(0xffffffffffffff9c, &(0x7f0000001e40)=@abs, &(0x7f0000001ec0)=0x6e) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001f00)=0xffffffffffffffff, 0x4) signalfd(0xffffffffffffff9c, &(0x7f0000000280), 0xfffffffffffffea5) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffff9c, &(0x7f0000001f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000002000)=0x80) accept(0xffffffffffffffff, &(0x7f0000002040)=@l2, &(0x7f00000020c0)=0x80) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000002100)) accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000003640), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0a9a3ef69dc0f01ee0dce41cbd9d99162a33d06290028770f0f993d233d234142d85d096b2179660f5474f200bae5e5e57545262e1ac4010d64ac1e5d31a3b7e29871bb7f") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="420f0f6f0194c4214fc2be000000214cf000f200008020d292000000001137370f38211ac46144e2974e2179fb0290c4a1c9e8dc0f2e1a430f00ce068f0978e3c09f4b") 03:36:09 executing program 1: setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[], 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) getpgrp(0xffffffffffffffff) getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000600)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000740)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000780)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840), &(0x7f0000000880)=0xc) getpgid(0x0) getuid() setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@broadcast, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, 0xe8) getuid() stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000440)) getpgid(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540), &(0x7f0000000580)=0xc) getegid() add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffff8) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/checkreqprot\x00', 0x0, 0x0) open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000800)='./file0/file0\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000680)) getuid() getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000140)={0x0, @remote, @broadcast}, &(0x7f0000000380)=0xc) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000004c0)={@empty, @remote}) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000004500)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) stat(&(0x7f0000003980)='./file0\x00', &(0x7f00000039c0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004340), 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700), &(0x7f00000006c0)=0xffffffffffffff84) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001a80), 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) getpgrp(0x0) getpgrp(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$key(0xf, 0x3, 0x2) 03:36:10 executing program 1: rmdir(&(0x7f00000004c0)='./file0\x00') unlink(&(0x7f0000000180)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:36:10 executing program 5: clock_gettime(0x1, &(0x7f0000000200)) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000001c0)=0xe8) setreuid(0x0, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000900)="428055a0690fef6bdc3641ffaa32233333ce41ff0f18373766460f3828523044c19086d9f28fc9f083170079fbc463fd7998b400ba0000ffff66410f60db2e0ac4010d64ac1e5d31a314b706e298987b7f") 03:36:11 executing program 1: getpid() perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000140)="0000000000000080eb4142e1b2a20962446db1566dd695ea63970131417c4180fc0a3017cf0081a83f46e4ae83c245ec41b7658054990ea91d3e269df60e8b297394c990cdd539f04c86aa085c816fa7f4c7acc1c6226625260e5753d3c8a4d5d30e1c63730399854b03250e0c58582035ede1592017734cde8207bb15582e5bd5aa676964f698bb0e7768a3ef0ff17fd64ef61f45de2ab31674f6f118023079aa75ef579ab56b4b000917dca887e3dfb747af84e02a20225178296f07a0d4cd4b1f1720c5cb924aa0eb64950cdb0d2a7b80621cdc32e89b9e46b1f26463935b47a4f8e32e52521c05264d6102f8402f63b74324362e6efb15fd6ace84d834", 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in=@multicast2, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'gre0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@ipv4={[], [], @multicast2}}, &(0x7f0000000700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@mcast2, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000001080)=0x2c7) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000280)={'veth1_to_team\x00', {0x2, 0x0, @dev}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000980)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000a80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000b80)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000bc0)={{{@in6=@loopback, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000dc0)={@local}, &(0x7f0000000e00)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000e40)={@empty, @remote}, &(0x7f0000000e80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000ec0)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000000380), 0xc, &(0x7f00000014c0)={&(0x7f00000010c0)=ANY=[]}}, 0x0) write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000240)={0x7}, 0x7) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x28, &(0x7f00000000c0)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f1750000dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000840)) 03:36:12 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{}, {0x77359400}}, &(0x7f00000001c0)) clock_settime(0x0, &(0x7f0000000600)) openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x0, 0x0) lgetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)=@random={'security.', '\x00'}, &(0x7f0000000200)=""/54, 0xffffffffffffff62) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:36:13 executing program 1: keyctl$set_reqkey_keyring(0x7, 0x4) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) gettid() getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) getpgrp(0x0) getgid() getpid() fstat(0xffffffffffffffff, &(0x7f00000002c0)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() pipe2$9p(&(0x7f0000000100), 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c40), 0x0, 0x0) clock_getres(0x0, &(0x7f00000000c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@loopback}, &(0x7f0000000440)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000980)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:36:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000380)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x5, &(0x7f0000000000), 0x4) 03:36:13 executing program 3: getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000bc0)) get_robust_list(0x0, &(0x7f0000000a00)=&(0x7f0000000240)={&(0x7f0000000b40), 0x0, &(0x7f0000000b80)={&(0x7f0000000140)}}, &(0x7f0000000ac0)=0x18) setrlimit(0x0, &(0x7f0000000200)) getpgrp(0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000680)='attr/sockcreate\x00') dup(0xffffffffffffffff) creat(&(0x7f0000000a80)='./file0\x00', 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000400), 0x0) syz_open_procfs(0x0, &(0x7f0000000500)="707f000000000000008a0901006500") getrandom(&(0x7f0000000680)=""/148, 0xff05, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) socket$unix(0x1, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'nr0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'ip6tnl0\x00'}) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000000900), 0x0, &(0x7f0000000940)=""/78, 0x4e}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000ac40), 0x0, 0x0, &(0x7f000000ae80)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000aec0)={0x0, @remote, @remote}, &(0x7f0000000a40)=0xc) getsockname(0xffffffffffffffff, &(0x7f000000af40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000afc0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000b000)={@multicast1, @rand_addr}, &(0x7f000000b040)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000d540)={0x0, @dev, @loopback}, &(0x7f000000d580)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000d680)={'veth0_to_bond\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000d6c0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000d780)={'bcsf0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000d7c0)={@local, @remote}, &(0x7f000000d800)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000d840)={@local, @dev}, &(0x7f000000d880)=0xc) recvmsg(0xffffffffffffffff, &(0x7f000000eb80)={&(0x7f000000d8c0)=@xdp, 0x80, &(0x7f000000ea40), 0x0, &(0x7f000000ea80)=""/232, 0xe8}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f000000ebc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ec00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f000000f2c0)={&(0x7f00000002c0), 0xc, &(0x7f000000f280)={&(0x7f0000000b40)=ANY=[]}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x38f) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000300), 0x2) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000400)) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) 03:36:14 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000080)) getpgrp(0x0) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000900)=0xc) getpid() getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000a80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ac0)={{{@in=@multicast1, @in6}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000bc0)=0xe8) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getegid() getpid() lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) getresgid(&(0x7f0000001240), &(0x7f0000001280), &(0x7f00000012c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000014c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000001600)=0xe8) stat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004d00)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000004e00)=0xe8) getresgid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004f40)={{{@in6=@loopback, @in6=@loopback}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000005040)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005080), &(0x7f00000050c0)=0xc) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005280)={{{@in=@dev, @in=@rand_addr}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000005380)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000053c0), &(0x7f0000005400)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000005440)) fstat(0xffffffffffffffff, &(0x7f0000005480)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005500), &(0x7f0000005540)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005580)) lstat(&(0x7f0000005600)='./file0/file0\x00', &(0x7f0000005640)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000007b40)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:36:14 executing program 0: mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/191) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000500)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000140)}}}) syz_extract_tcp_res(&(0x7f0000000040), 0x0, 0x0) futex(&(0x7f0000000480), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x1c9c380}, &(0x7f00000004c0), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) io_setup(0x0, &(0x7f0000000180)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000600)) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000440)='{.vboxnet1,+securitymime_typetrustedvmnet1\x00', 0xffffffffffffff9c}, 0x10) syz_open_procfs(0x0, &(0x7f0000000680)='net/ip_tables_names\x00') socket$inet_tcp(0x2, 0x1, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/load\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") 03:37:37 executing program 2: getpriority(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") ioprio_get$pid(0x0, 0x0) syz_execute_func(&(0x7f0000000140)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:37:37 executing program 4: syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000340)) clock_settime(0x0, &(0x7f0000000300)) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) prlimit64(0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)) timer_create(0x0, &(0x7f0000001340)={0x0, 0x0, 0x0, @thr={&(0x7f0000000180), &(0x7f0000000040)}}, &(0x7f0000001380)) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="428055a07e6969ef69dc00d9c421a05d2fc4e135dc2ff2420f58410da2cdae300f8f6908943e400f1285000000001a40a5c07f41dfe0400f01efe5d70fecec1a1ac4a159e92420c4ea899ba05200000045dff34590") 03:37:37 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0), &(0x7f0000000380)=0x4) prctl$intptr(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'gre0\x00'}) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000005c0)={0x0, {{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}}, 0x90) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000440)={'broute\x00'}, &(0x7f0000000180)=0x78) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001840)={@loopback}, &(0x7f00000003c0)=0xfffffffffffffc87) sendto$packet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001580)='/dev/vga_arbiter\x00', 0x0, 0x0) pselect6(0xfffffffffffffd2f, &(0x7f0000000180), &(0x7f00000015c0), &(0x7f0000001540), &(0x7f0000001640)={0x0, 0x989680}, &(0x7f00000016c0)={&(0x7f0000001680), 0x8}) clock_getres(0x0, &(0x7f0000000380)) pipe(&(0x7f0000000200)) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000001800)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) getrusage(0x0, &(0x7f0000000240)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001540)=ANY=[], &(0x7f0000000540)=""/4096, 0x0, 0x1000}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000001600), &(0x7f00000017c0)=0x4) fstat(0xffffffffffffffff, &(0x7f00000004c0)) getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000001700)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="42805da0be0fef69dc0f01eece73fec4e161763f380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) 03:37:37 executing program 0: inotify_init1(0x100) eventfd(0x0) dup(0xffffffffffffffff) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000200)) accept4(0xffffffffffffffff, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000640)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x1c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) fstat(0xffffffffffffffff, &(0x7f00000005c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001080)) stat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) lstat(&(0x7f0000001180)='./file0\x00', &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001300)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@mcast2, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000018c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ac0)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000001bc0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000001c00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) stat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001e00)) getuid() stat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getgroups(0x0, &(0x7f0000001f00)) pipe(&(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005480)={{{@in6=@remote, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, &(0x7f0000005580)=0xe8) lstat(&(0x7f00000055c0)='./file0\x00', &(0x7f00000003c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005980), &(0x7f00000059c0)=0xc) getresgid(&(0x7f0000005a00), &(0x7f0000005a40), &(0x7f0000005a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005ac0), &(0x7f0000005b00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005b40)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000005c40)=0xe8) getegid() getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005c80), &(0x7f0000005cc0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000005d00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000071c0)) getresuid(&(0x7f0000007200), &(0x7f0000007240), &(0x7f0000007280)) getgroups(0x1e439b86eb889b64, &(0x7f0000005d80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007640)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000007740)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000007780)) getpid() getresuid(&(0x7f00000001c0), &(0x7f0000007840), &(0x7f0000007880)) lstat(&(0x7f00000078c0)='./file0\x00', &(0x7f0000005680)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000007980)) fstat(0xffffffffffffffff, &(0x7f00000079c0)) syz_execute_func(&(0x7f0000000a40)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:37 executing program 5: clock_nanosleep(0x7, 0x0, &(0x7f0000000240), &(0x7f00000003c0)) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:37:37 executing program 3: sigaltstack(&(0x7f0000ffa000/0x3000)=nil, 0x0) unlink(&(0x7f00000004c0)='./file0\x00') fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000007c0), &(0x7f0000000840)=0x4) prctl$setname(0xf, &(0x7f0000000140)='!md5sum-bdevcpuset!\x00') write$selinux_user(0xffffffffffffffff, &(0x7f0000000940)={'system_u:object_r:dhcpd_var_run_t:s0', 0x20, 'staff_u\x00'}, 0x2d) dup2(0xffffffffffffff9c, 0xffffffffffffffff) epoll_pwait(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0, &(0x7f0000000500), 0x8) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) memfd_create(&(0x7f0000000240)='(&\x00', 0x0) request_key(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700), &(0x7f0000000740)='\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000680), 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000800)) lstat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000600)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000980)=ANY=[]) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') clock_gettime(0x0, &(0x7f0000002280)) recvmmsg(0xffffffffffffffff, &(0x7f00000020c0), 0x0, 0x0, &(0x7f00000022c0)) getpeername$packet(0xffffffffffffffff, &(0x7f0000002300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002340)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002380)={'gretap0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002400)=0x14, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000002440)={'ipddp0\x00', @ifru_addrs=@can}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002480)={0x0, @remote, @loopback}, &(0x7f00000024c0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000002500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002540)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002600)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000002640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002680)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000026c0)={0x0, @remote, @remote}, &(0x7f0000002700)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002740)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000002840)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002f80)={0x0, @dev, @multicast1}, &(0x7f0000002fc0)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000030c0)={0x0, @dev, @broadcast}, &(0x7f0000003100)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003c40)={@local, @dev}, &(0x7f0000003c80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000003e40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000043c0)={@remote, @rand_addr}, &(0x7f0000004400)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f00000074c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007500)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000007600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007640)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000007780)=@req={0x28, &(0x7f0000007740)={'ip6gre0\x00', @ifru_addrs=@xdp}}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007b00)={{{@in=@remote, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}}}, &(0x7f0000007c00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000007dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007e00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007e40)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007e80)={@mcast1}, &(0x7f0000007ec0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000007f00)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007f40), &(0x7f0000007f80)=0x14) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f0000008000)=@req={0x28, &(0x7f0000007fc0)={'ifb0\x00', @ifru_addrs=@hci}}) accept$packet(0xffffffffffffffff, &(0x7f0000008040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008080)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008580)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000085c0)={@loopback}, &(0x7f0000008600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008640)={'team0\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000009280)={&(0x7f00000002c0), 0xc, &(0x7f0000009240)={&(0x7f0000008680)={0x14}, 0x14}}, 0x0) symlinkat(&(0x7f0000000080)='./file1\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) getrandom(&(0x7f0000000180)=""/148, 0x94, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000040)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000540)) syz_genetlink_get_family_id$nbd(&(0x7f0000000900)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000280), 0xc, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000880)) 03:37:38 executing program 1: rmdir(&(0x7f00000001c0)='./file0\x00') select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") init_module(&(0x7f0000000080)='ppp0nodev+\x00', 0xb, &(0x7f00000002c0)='&{,\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000240)) dup(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000ac0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast2, @in6=@local}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000580)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000600)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@loopback, @in=@remote}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000640)=0xe8) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000008c0)=0x8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000cc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d00)={{{@in6, @in=@loopback}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000e00)=0xe8) 03:37:39 executing program 1: ioprio_set$uid(0x2, 0x0, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)) timer_getoverrun(0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000400)='./file0\x00'}, 0x10) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000005c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000640)) getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, &(0x7f0000000040)=0x80) utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) prctl$seccomp(0x16, 0x0, &(0x7f0000000340)={0x0, &(0x7f0000000300)}) futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000080), 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000140)=""/246) getpid() sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x40084503, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1c, 0x0) listen(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000004c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "7ab439ea9686726bfabc4462b499c9875263b31736f93eb15fa8aba2c8f8f2ec02c96d354931be195c8812b83612d3e80f2ada1f63db4e78af030718956d254433d36563f2130380b510e943d25c2a3c"}, 0xd8) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f00000003c0)={0x0, &(0x7f0000000300)}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000400)=""/149) socket$unix(0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:37:39 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x8440, 0x0) getpid() syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000680)={{{@in=@local, @in=@remote}}, {{@in6}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000008c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000a00)=0xfd44) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000b80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d00)={{{@in6=@local, @in6}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000010c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in6=@ipv4, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001240)={'team0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000001280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000012c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001380)=0x14) clock_gettime(0x0, &(0x7f0000008d40)) recvmmsg(0xffffffffffffffff, &(0x7f0000008b00), 0x0, 0x0, &(0x7f0000008d80)) getpeername$packet(0xffffffffffffffff, &(0x7f0000008e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000008ec0)=0x14) accept4(0xffffffffffffffff, &(0x7f0000008f00)=@ll, &(0x7f0000008f80)=0x80, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000009500)={&(0x7f0000000200), 0xc, &(0x7f00000094c0)={&(0x7f0000000e00)=ANY=[]}}, 0x0) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000bc0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000000cc0)=0xe8) getresgid(&(0x7f0000002d00), &(0x7f0000002d40), &(0x7f0000002d80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e00)={{{@in=@broadcast, @in=@dev}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getegid() gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@remote, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000004540)=0xfffffffffffffe72) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa8ea49a3917390f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:37:40 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000001740)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000001780)=0x1c) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000004c0), &(0x7f0000000580)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000009440), 0x0, 0x0, &(0x7f0000009680)={0x77359400}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000017c0)={{0xa, 0x0, 0x0, @mcast2}}, 0x5c) eventfd(0x0) fchdir(0xffffffffffffffff) dup(0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000001680)={0x0, {{0x2, 0x0, @dev}}}, 0x88) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) fchdir(0xffffffffffffffff) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000001580)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x0, "4292c58461bb2486edb6469a6b07c752d811595f0e1a56e58a7d9b70c2a23374e96c05d43ff044acd2931a23cc19453c34fc3dd99b39a879bb76ab03ecf98c8be6286c18ae51c35c15bdddff01f86604"}, 0xd8) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@local, @in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) dup(0xffffffffffffffff) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000440)={0x77359400}, 0x10) pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000380)={&(0x7f0000000340), 0x8}) open(&(0x7f0000001500)='./file0\x00', 0x0, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000680)=@random={'security.', 'system$\x00'}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") set_thread_area(&(0x7f00000003c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000400)) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000500)={{0x0, @multicast1, 0x0, 0x0, 'wlc\x00'}, {@remote}}, 0x44) socket$inet_tcp(0x2, 0x1, 0x0) 03:37:40 executing program 1: ioprio_set$uid(0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) getrusage(0x0, &(0x7f0000000140)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000300)) pipe(&(0x7f0000000540)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f00000000c0)}) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) umount2(&(0x7f0000000080)='./file0\x00', 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000280)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) request_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000003c0), &(0x7f0000000400)='trusted.overlay.redirect\x00', 0xfffffffffffffff9) keyctl$read(0xb, 0x0, &(0x7f0000000440)=""/26, 0x1a) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000500)) ioctl$void(0xffffffffffffffff, 0x0) write$evdev(0xffffffffffffffff, &(0x7f00000005c0), 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x0) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) set_robust_list(&(0x7f0000000580)={&(0x7f0000000540)={&(0x7f0000000f00)}}, 0x18) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) 03:37:41 executing program 1: pipe2$9p(&(0x7f0000000140), 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") fcntl$notify(0xffffffffffffffff, 0x402, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@loopback, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6, @in=@remote}}, {{@in=@local}}}, &(0x7f00000003c0)=0xe8) accept(0xffffffffffffffff, &(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x80) geteuid() 03:37:42 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x14}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000040)) poll(&(0x7f0000000180)=[{r1}], 0x1, 0x0) 03:37:42 executing program 1: clock_adjtime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:37:49 executing program 0: sync() eventfd2(0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000008c0), 0x0, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) epoll_create1(0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f00000008c0)=0xfffffd07) lchown(&(0x7f00000005c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="c5b9c49bedf1"}, 0x10) lgetxattr(&(0x7f0000000240)='./file1\x00', &(0x7f0000000880)=@known='system.posix_acl_default\x00', &(0x7f0000000c00)=""/148, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000001c0), 0x14) getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000480)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) stat(&(0x7f0000000580)='./file1\x00', &(0x7f0000000a40)) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@remote, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000040)=@proc, 0xc, &(0x7f0000000340), 0x0, &(0x7f0000000840)}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000340)='trusted.overlay.opaque\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:37:49 executing program 4: getgroups(0x1, &(0x7f0000000040)=[0xee00]) getgid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getgid() fstat(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000240)=0xc) fstat(0xffffffffffffff9c, &(0x7f00000004c0)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) setgroups(0x0, &(0x7f00000004c0)) clock_adjtime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0c26969ef69dc00d9906920375137c339392a8e0f38211a0fdcd664a741fae0400f01efe5e5417545460f44352f7d00001a1a01460f01ee31a3b786e298262e64f30f2b05090000003f") openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000005c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000006c0)={@mcast1}, &(0x7f0000000700)=0x14) accept4(0xffffffffffffffff, &(0x7f0000000740)=@hci, &(0x7f00000007c0)=0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001080)={{{@in=@loopback, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000001180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002440)={{{@in6=@dev, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000002540)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000002580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000025c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002640)) accept4$packet(0xffffffffffffffff, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002780)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000027c0)={'dummy0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000002800)={@mcast1}, &(0x7f0000002840)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000002880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000028c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000002900), &(0x7f0000002940)=0x14, 0x0) accept(0xffffffffffffffff, &(0x7f0000003dc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003e40)=0x80) recvmsg(0xffffffffffffffff, &(0x7f0000003fc0)={&(0x7f0000003e80)=@can, 0x80, &(0x7f0000003f80)}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004000)={{{@in6=@mcast1, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000004100)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004140)={{{@in6, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000004240)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004340)={{{@in6, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000004440)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004500)={{{@in6=@ipv4={[], [], @local}, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000004600)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004700)={{{@in6=@local, @in=@remote}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000004800)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004980)={{{@in6, @in6=@local}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000004a80)=0xe8) clock_gettime(0x0, &(0x7f000000ed80)) recvmmsg(0xffffffffffffffff, &(0x7f000000ebc0), 0x0, 0x0, &(0x7f000000edc0)) accept4$packet(0xffffffffffffffff, &(0x7f000000ee00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000ee40)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000efc0)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f000000f000)={@dev}, &(0x7f000000f040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000f140)={'bridge_slave_0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f000000f180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000f1c0)=0x14, 0x0) 03:37:49 executing program 1: socketpair(0x0, 0xe, 0x0, &(0x7f00000003c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000340)={'icmp6\x00'}, &(0x7f0000000380)=0x1e) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000980)) memfd_create(&(0x7f0000000180)='\x00', 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000a40)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000002c0)={@loopback}, 0x14) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000006c0), 0x4) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000780)=0x4) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x34f, 0x0, 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000740)=@known='trusted.overlay.upper\x00', &(0x7f0000000840)='!}\x00', 0x3, 0x0) poll(&(0x7f0000000200), 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000007c0)={0x0, @remote, @rand_addr}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@local, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) accept4$inet(0xffffffffffffffff, &(0x7f00000009c0)={0x2, 0x0, @local}, &(0x7f0000000a00)=0x10, 0x0) quotactl(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, &(0x7f0000000640)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000940)) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000a80)) fstatfs(0xffffffffffffffff, &(0x7f00000080c0)=""/210) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setxattr$trusted_overlay_nlink(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000440)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'U-', 0x7}, 0x28, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:49 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x14}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000040)) poll(&(0x7f0000000180)=[{r1}], 0x1, 0x0) 03:37:49 executing program 5: uname(&(0x7f0000000340)=""/76) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0), 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000001480)=0xc) stat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f0000001580)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001640)={{{@in=@dev, @in6=@local}}}, &(0x7f0000001740)=0xe8) stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001840)) fstat(0xffffffffffffffff, &(0x7f0000001880)) getgroups(0x0, &(0x7f0000001900)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001980)={&(0x7f0000001940)='./file0\x00'}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) inotify_init1(0x0) epoll_create1(0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000019c0)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000001a00)='/dev/loop#\x00', 0x0, 0x0) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) getresgid(&(0x7f0000001ac0), &(0x7f0000001b00), &(0x7f0000001b40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001b80)) geteuid() lstat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000001d00)='syz0\x00', 0x200002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001d40)='/dev/rtc0\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001d80)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001e00)='/proc/self/net/pfkey\x00', 0x0, 0x0) pipe(&(0x7f0000001e40)) socket$unix(0x1, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001e80)) geteuid() stat(&(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001f80)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001fc0)='/selinux/checkreqprot\x00', 0x0, 0x0) accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000002000), 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6(0xa, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000002040)='/dev/uinput\x00', 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000002080)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004700)={{{@in=@loopback, @in6=@dev}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000004800)=0xe8) getegid() openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000004840)='cgroup.subtree_control\x00', 0x2, 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000004880)='/selinux/context\x00', 0x2, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000048c0)='/dev/ashmem\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000004900)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$sndtimer(&(0x7f0000004940)='/dev/snd/timer\x00', 0x0, 0x0) dup(0xffffffffffffffff) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004980)={{{@in6, @in=@dev}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@dev}}, &(0x7f0000004a80)=0xe8) stat(&(0x7f0000004ac0)='./file0\x00', &(0x7f0000004b00)) inotify_init1(0x0) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000004b80)='/dev/ashmem\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004c00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000004bc0)='team\x00', 0xffffffffffffffff}, 0x30) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000004c40)='/selinux/validatetrans\x00', 0x1, 0x0) getpgrp(0xffffffffffffffff) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c80), &(0x7f0000004cc0)=0xc) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000004d00)) geteuid() lstat(&(0x7f0000004d40)='./file0\x00', &(0x7f0000004d80)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004e00), &(0x7f0000004e40)=0xc) lstat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005040), 0x0, 0x0) dup(0xffffffffffffffff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002480)={{{@in=@multicast1}}, {{@in6=@ipv4={[], [], @loopback}}}}, &(0x7f0000002580)=0xe8) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:37:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000280)}, 0x8000) write(r0, &(0x7f00000001c0)='n', 0x1) 03:37:50 executing program 4: prctl$void(0x1f) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0ae66262e3e660f5621ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2988fa9a8917c42a5567f") getcwd(&(0x7f0000000140)=""/223, 0x9) dup(0xffffffffffffff9c) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000540)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'team0\x00'}) creat(&(0x7f0000000380)='./file0\x00', 0x0) socket$inet6(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl, 0x80, &(0x7f0000002000), 0x0, &(0x7f0000004000)}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14, 0x0) prctl$setname(0xf, &(0x7f00000000c0)=')\x00') socket$inet_udp(0x2, 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)='bpq0\x00') fchmodat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000000340)=@nfc, &(0x7f00000003c0)=0x80, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000d40)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d80)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000e80)=0xe8) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000f80)) 03:37:50 executing program 1: lookup_dcookie(0x0, &(0x7f0000000400)=""/3, 0xfddf) umount2(&(0x7f0000000480)='./file0\x00', 0x0) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="428055a0fffafa292b29f4e684e68400d9ce41c4ff0f0f37370f38211a440f00e13e3e660fd8ba00000000410feef24e2179fbe5e50fe7250050ddca0f2e1a2e46d1489d064ae2989f") socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) syz_execute_func(&(0x7f0000000540)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0fd3d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:50 executing program 1: futex(&(0x7f0000000400), 0x3, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0), 0x0) memfd_create(&(0x7f0000000640)='cgroupeth0]', 0x0) io_setup(0x0, &(0x7f0000000340)) io_cancel(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f00000003c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f00000008c0)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f0000000680), 0x0, 0x0, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="90cc58664139"}, 0x14) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000740)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000006c0)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) munlockall() clock_gettime(0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000600)) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000800)={0x77359400}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000280)={0x14}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000440)) connect(0xffffffffffffffff, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f0000000600)='./file1\x00'}, 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000500)) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:51 executing program 4: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000080)=0xe8) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in6=@remote}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) getgid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000001c0)={0x0, 0x1, 0x6}, 0x10) getgroups(0x0, &(0x7f0000000180)) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000580)={0x10}, 0x10) syz_execute_func(&(0x7f0000000200)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:37:51 executing program 1: rt_sigpending(&(0x7f0000000040), 0x8) timerfd_create(0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000400)='vmnet1ppp1+.vmnet0\x00', 0x0) accept4(0xffffffffffffffff, &(0x7f0000000840)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0), 0xc, &(0x7f0000000600)={&(0x7f00000004c0)=ANY=[]}}, 0x0) add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f00000028c0), 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000003bc0)='user\x00', &(0x7f0000003c00), &(0x7f0000003c40), 0x341, 0x0) prctl$setname(0xf, &(0x7f00000000c0)='/dev/full\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000180)=""/67, &(0x7f0000000200)=0xfffffffffffffec5) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000480)=""/74) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000500)=ANY=[]}}, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) lstat(&(0x7f0000000280)='.\x00', &(0x7f0000000680)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000005c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) 03:37:52 executing program 4: getgroups(0x1, &(0x7f0000000040)=[0xffffffffffffffff]) setfsgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)="3a166574683076626f786e657431776c616e30776c616e316d643573756d2d5d00", 0xffffffffffffffff}, 0x30) socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000280)=0x14) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000180), 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000080)=""/11) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip_vti0\x00'}) 03:37:53 executing program 0: keyctl$set_reqkey_keyring(0x10, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f00000001c0)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), 0xc) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=""/31, &(0x7f0000000200)=0x1f) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x10) socket$nl_route(0x10, 0x3, 0x0) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fbc461f85975a6") 03:37:53 executing program 4: mlockall(0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) getrlimit(0x0, &(0x7f0000000280)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:37:53 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000600), &(0x7f00000005c0)) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getegid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='vlan0\x00'}, 0xfffffe8a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) sync() ioprio_set$uid(0x0, 0x0, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002180)={{{@in6=@remote, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000002280)=0xe8) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000022c0), &(0x7f0000002300)=0xc) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@loopback, @in=@local}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000035c0)=0xe8) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003600)={{{@in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000003700)=0xe8) getpgid(0xffffffffffffffff) getuid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003740)) fstat(0xffffffffffffffff, &(0x7f0000003780)) getgid() open$dir(&(0x7f0000003800)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003840)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003880)={{{@in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000003980)=0xe8) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in6=@mcast2, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in=@broadcast}}, &(0x7f0000003ac0)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003b00)) stat(&(0x7f00000056c0)='./file0\x00', &(0x7f0000003b80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000007c0)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa37b90f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c48235905c5f13c4c3916efafe9f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000380)="42805da00fef69dc0f01ee263a208600acc041cbcb3e3636a72900770f7899583d2350230606eafa6b2179660f38302fbae5e5e575450f2e1a8af5c44379dfb9d6adbe90dfe2989f7e") 03:37:53 executing program 2: futex(&(0x7f0000000080), 0x6, 0x0, &(0x7f0000000100)={0x400000000}, &(0x7f00000000c0), 0x0) keyctl$set_reqkey_keyring(0x7, 0x0) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000200)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000440)=0x3ae) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f00000021c0)=0xc) gettid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002200)={{{@in6=@ipv4={[], [], @multicast1}, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@multicast2}}, &(0x7f0000002300)=0xe8) getegid() getpgid(0x0) geteuid() lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f00000004c0)) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in=@dev, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in6=@local}}, &(0x7f0000002880)=0xe8) getgroups(0x0, &(0x7f00000028c0)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002900)={{{@in=@remote, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000002a00)=0xffffffffffffff8a) getresgid(&(0x7f0000002a40), &(0x7f0000002a80), &(0x7f0000002ac0)) lstat(&(0x7f0000002b00)='./file0\x00', &(0x7f0000002b40)) getresgid(&(0x7f0000002bc0), &(0x7f0000002c00), &(0x7f0000002c40)) getpid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000002c80)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002e00), 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) getpgid(0x0) getpid() ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000340)) clock_gettime(0x0, &(0x7f0000000840)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getgid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000540)) getgroups(0x0, &(0x7f00000002c0)) mincore(&(0x7f0000ffa000/0x2000)=nil, 0x2000, &(0x7f0000000380)=""/165) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000240), &(0x7f00000008c0)) 03:37:56 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x14}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000040)) poll(&(0x7f0000000180)=[{r1}], 0x1, 0x0) 03:37:56 executing program 1: setgroups(0xf9, &(0x7f0000000040)) getgid() seccomp(0x8000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="428055a0336969ef69dc364180c7e041a30f7f7f3766460f38285230c4637905a70d000000c135c935c97d197a0779fb8f2860ceeba679cbff43d0e1460f0da11b000000010d64ac1e5d31a314b706e242d08039c52a7d987b7f") prctl$setname(0xf, &(0x7f0000000140)='/selinux/enforce\x00') fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)) ptrace$peekuser(0x3, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x0, 0x50, [], 0x0, &(0x7f0000000140), &(0x7f0000000180)=""/80}, &(0x7f0000000280)=0x78) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 03:37:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) prctl$setname(0xf, &(0x7f0000000440)='\b\x00\x00\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000180)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000580)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000200)) getpid() timer_create(0x0, &(0x7f0000000300), &(0x7f00000003c0)) syz_execute_func(&(0x7f0000000080)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4}, 0x0, @in=@rand_addr}}, &(0x7f0000000500)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@local, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000880)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000008c0)={@dev, @multicast2}, &(0x7f0000000900)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in6=@remote, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000a40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000b40)={'vcan0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @rand_addr, @multicast1}, &(0x7f0000000bc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e80)={@local}, &(0x7f0000000ec0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f00)={{{@in=@local, @in6}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000001000)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001040)={@remote}, &(0x7f0000001080)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000280), 0xc, &(0x7f00000016c0)={&(0x7f00000010c0)={0x14}, 0x14}}, 0x0) 03:37:57 executing program 1: keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000140), 0x0) clock_gettime(0x0, &(0x7f0000000340)) pipe(&(0x7f00000005c0)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000280), 0x4) chroot(&(0x7f0000000040)='./file0\x00') accept4(0xffffffffffffffff, &(0x7f0000000600)=@in={0x2, 0x0, @multicast1}, &(0x7f0000000500)=0x80, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) mknod$loop(&(0x7f0000000480)='./file0\x00', 0x0, 0xffffffffffffffff) ptrace$peekuser(0x3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x0, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@loopback}}, {{@in6=@ipv4}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@remote, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000400)=0xe8) stat(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000540)) geteuid() getresuid(&(0x7f0000000ac0), &(0x7f0000000b00), &(0x7f0000000b40)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@multicast1, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000c80)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000cc0)) getgid() lstat(&(0x7f0000000d40)='./file0/file0\x00', &(0x7f0000000d80)) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)) getresgid(&(0x7f0000000ec0), &(0x7f0000000f00), &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f80), &(0x7f0000000fc0)=0xc) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000010c0), 0x24, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffc) syz_emit_ethernet(0x66, &(0x7f0000000640)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @local}, @gre}}}}, &(0x7f0000000080)) syz_emit_ethernet(0x0, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='%*posix_acl_access\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:37:57 executing program 4: clock_nanosleep(0x7, 0x0, &(0x7f00000004c0), &(0x7f0000000080)) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b80)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, &(0x7f0000000a80)=""/216, 0x1a, 0xd8}, 0x20) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in=@dev, @in6=@remote}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000900)=0xe8) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@dev, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000700)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000740)={@dev}, &(0x7f0000000780)=0x14) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000bc0)=""/56, &(0x7f0000000c00)=0x38) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000a40)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004180)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000056c0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005700)={'team_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005740)={{{@in=@rand_addr, @in=@multicast1}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@mcast2}}, &(0x7f0000005840)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005c00)={&(0x7f0000000380), 0xc, &(0x7f0000005bc0)={&(0x7f0000005880)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@multicast1, @in=@local}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000240), &(0x7f0000000280)=0x14) memfd_create(&(0x7f00000002c0)=']+\x00', 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f00000027c0), 0x0, &(0x7f0000002840)}, 0x0) epoll_create(0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000140)) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000440)="42805da06d0fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:37:57 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x14}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000040)) poll(&(0x7f0000000180)=[{r1}], 0x1, 0x0) 03:37:58 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xffff7ffffffffff8) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) gettid() write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000180), 0xa) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000340)={'ip6gretap0\x00', {0x2, 0x0, @multicast1}}) timer_create(0x0, &(0x7f0000000940)={0x0, 0x0, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000840)}}, &(0x7f00000002c0)) mremap(&(0x7f0000fef000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) eventfd(0x0) accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000200)=0x1c) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) seccomp(0x0, 0x0, &(0x7f0000000100)) setxattr$trusted_overlay_origin(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.origin\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) dup(0xffffffffffffffff) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0xc7, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)) socket$inet_udplite(0x2, 0x2, 0x88) openat$dir(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key(&(0x7f0000000500)='asymmetric\x00', &(0x7f0000000540), &(0x7f0000000580), 0x0, 0xfffffffffffffffd) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000580)={0x7}, 0x7) keyctl$revoke(0x3, 0x0) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 03:37:59 executing program 0: syz_extract_tcp_res(&(0x7f0000000300), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000340), 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000740)={@random="095e0ca80f58", @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @loopback}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "a124dd", 0x0, "1969a5"}}}}}}, &(0x7f0000000440)) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42f9805da05151ef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23416eee26420fd4143238f6eeba39290f38c4827d20c9660f73f70053fed7d7422121010d64ac1e5d71a3b7e0ce9d") signalfd4(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) getpgid(0xffffffffffffffff) 03:37:59 executing program 1: getrusage(0x0, &(0x7f0000000380)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000005c0)) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in=@dev, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xffffffffffffffb4) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000004240)='systemselinuxvboxnet0\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000042c0)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f00000043c0)=0xe8) getresgid(&(0x7f0000004400), &(0x7f0000004440), &(0x7f0000004480)) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)) getgroups(0x0, &(0x7f0000004ac0)) getpid() lstat(&(0x7f0000004b00)='./file0\x00', &(0x7f0000004b40)) getgroups(0x0, &(0x7f0000004bc0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006440)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000006400)='attr/exec\x00'}, 0x30) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)) fstat(0xffffffffffffffff, &(0x7f0000006540)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000065c0)) fstat(0xffffffffffffffff, &(0x7f0000006600)) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006680), &(0x7f00000066c0)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006980)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000006a80)=0xe8) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000006ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006b00), &(0x7f0000006b40)=0xc) getresgid(&(0x7f0000006b80), &(0x7f0000006bc0), &(0x7f0000006c00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a06b6969ef69dc00d99069203737c3397c2a8e0f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000dc0)="42804da0c60fef69dc330f0122cec273fe660fef74a409387c3667f9460738286a00f081768cc8000000c481b5e5bc2b00000021f3e12dba32047000000fed84210b000000cacad379dae5cfe5e56aac410f0fbd090000001ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:37:59 executing program 4: utime(&(0x7f00000004c0)='.\x00', &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)) syz_open_procfs(0x0, &(0x7f0000001d00)='net/rfcomm\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000001d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d80)=0x14) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000900)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000c00)) fstat(0xffffffffffffffff, &(0x7f00000016c0)) fstat(0xffffffffffffffff, &(0x7f0000000d00)) getgroups(0x0, &(0x7f0000000d80)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in6=@ipv4}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000ec0)=0xe8) lstat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) getgroups(0x0, &(0x7f00000012c0)) stat(&(0x7f0000001300)='./file0\x00', &(0x7f0000000080)) getresgid(&(0x7f00000013c0), &(0x7f0000000180), &(0x7f0000000280)) geteuid() getgroups(0x0, &(0x7f0000001480)) timerfd_create(0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000014c0)='cgroup.type\x00', 0x2, 0x0) stat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002ec0)={{{@in6, @in=@dev}}, {{@in=@dev}}}, &(0x7f0000002fc0)=0x2d0) fstat(0xffffffffffffffff, &(0x7f0000003000)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) fstat(0xffffffffffffffff, &(0x7f0000003100)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003180)={{{@in6=@dev, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000003280)=0xe8) getgid() getuid() stat(&(0x7f0000005800)='./file0\x00', &(0x7f0000005840)) stat(&(0x7f00000058c0)='./file0\x00', &(0x7f0000005900)) getegid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5afe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:38:00 executing program 2: unshare(0x4000000) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f0000000140)=0x6e) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={'bcsh0\x00', {0x2, 0x0, @loopback}}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da07e0fef69dc640f175000c4227d19decb410f38053f660f3825cf260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") getpid() stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@local, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f00000007c0)=0xe8) syz_execute_func(&(0x7f0000000ac0)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:04 executing program 5: clock_nanosleep(0x2, 0x0, &(0x7f0000000240), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0556d6def69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:04 executing program 1: fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=ANY=[]) socket$inet_udplite(0x2, 0x2, 0x88) getsockname$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in, @in=@local}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@dev}, 0x0, @in6=@dev}}, 0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080), &(0x7f0000000140)='em1cgroup%\x00', 0xfffffffffffffffb) add_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f0000000540), 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, &(0x7f0000000240), 0x0, 0x0) request_key(&(0x7f0000000400)='syzkaller\x00', &(0x7f0000000480), &(0x7f00000004c0)=',\x00', 0xfffffffffffffffd) add_key(&(0x7f0000000540)='ceph\x00', &(0x7f0000000580), &(0x7f0000000680), 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000180)) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000240)) nanosleep(&(0x7f0000000280), &(0x7f00000002c0)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001940)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001a40)={{{@in=@remote, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000001b40)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000001b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001bc0)=0x34b) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000005d40)={@multicast2, @loopback}, &(0x7f0000005d80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000005c0)={@remote}, &(0x7f0000000600)=0x39a) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000005f80)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005fc0)={{{@in=@multicast1, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000060c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006100)={{{@in=@rand_addr, @in6}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000006200)=0xe8) 03:38:04 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f000000f000), 0xc, &(0x7f0000bd7000)={&(0x7f0000c91000)=@newsa={0x144, 0x10, 0x713, 0x0, 0x0, {{@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in=@loopback, 0x0, 0x32}, @in6=@loopback, {}, {}, {}, 0x0, 0x0, 0x2}, [@tfcpad={0x8}, @algo_aead={0x4c, 0x12, {{'rfc4309(rfc4309(rfc7539(xts(twofish),rmd320-generic)))\x00'}}}]}, 0x144}}, 0x0) 03:38:04 executing program 3: timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x77359400}, {0x77359400}}, 0x0) inotify_init() ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xffffffffffffff9c}) clock_adjtime(0x0, &(0x7f0000000340)) unshare(0x0) pipe2(&(0x7f00000005c0), 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000600)) add_key(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740), &(0x7f0000000780), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000b00), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000b40)='asymmetric\x00', &(0x7f0000000b80), &(0x7f0000000c00)='gre0\x00', 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000540)='nbd\x00') add_key$user(&(0x7f0000000a40)='user\x00', &(0x7f0000000a00), &(0x7f0000000840), 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getpeername$inet(0xffffffffffffffff, &(0x7f0000004080)={0x2, 0x0, @multicast2}, &(0x7f00000041c0)=0x10) geteuid() getresgid(&(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffffa) getitimer(0x0, &(0x7f0000000440)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000a80)={@local, @loopback}, 0x4) socket$inet_udp(0x2, 0x2, 0x0) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") clock_gettime(0x0, &(0x7f0000003f80)) getitimer(0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[]}}, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000003e00), 0x0, 0x0, &(0x7f0000003fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) 03:38:04 executing program 4: eventfd2(0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000d4a000)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f00003daff4)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000280)) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000004c0), 0x20) syz_open_procfs(0x0, &(0x7f0000000480)='net/mcfilter\x00') getpid() openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00'}, 0x118) memfd_create(&(0x7f0000000240)='peth1lo\\systemselinux\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) syz_execute_func(&(0x7f00000002c0)="428055a08e6969ef69dc00d9d0d3c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5dc4632d5c271e9f7f") ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000200)) 03:38:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) gettid() getresuid(&(0x7f0000000d80), &(0x7f0000000ec0), &(0x7f0000000f00)) getgroups(0x0, &(0x7f0000000f40)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000d40), 0x0, &(0x7f0000001240)=ANY=[]}, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000000d40), 0x0, 0x0, &(0x7f0000000bc0)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000dc0), 0x4) seccomp(0x0, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000001c0)={@mcast1}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={@ipv4={[], [], @local}}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getpgrp(0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in, @in6=@mcast1}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000580)=0xe8) add_key$keyring(&(0x7f0000000ac0)='keyring\x00', &(0x7f0000000b00), 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000b40)='id_legacy\x00', &(0x7f0000000b80), &(0x7f0000000c00), 0x0, 0xfffffffffffffffa) keyctl$link(0x8, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000005c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000740)=0xe8) getgid() signalfd4(0xffffffffffffffff, &(0x7f0000000780), 0x8, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000007c0)={{{@in, @in=@loopback}}, {{@in6=@dev}}}, &(0x7f00000008c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) stat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000a40)) geteuid() stat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) 03:38:05 executing program 4: syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x400000) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000640)) getrandom(&(0x7f0000000040)=""/148, 0x94, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000780)='./file1\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000cc0)='&vboxnet1\x00'}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0), &(0x7f0000000e00)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000e40)) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) lstat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) lstat(&(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001140), &(0x7f0000001180)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000011c0)={{{@in6=@local, @in=@multicast1}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f00000012c0)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001340)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001300)='\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001380)={{{@in=@rand_addr, @in=@multicast1}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000001480)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000014c0)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() getresgid(&(0x7f0000001a40), &(0x7f0000001a80), &(0x7f0000001ac0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002dc0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002e00)={{{@in=@multicast2, @in=@rand_addr}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000002f00)=0xe8) getresgid(&(0x7f0000002f40), &(0x7f0000002f80), &(0x7f0000002fc0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003000)) fstat(0xffffffffffffffff, &(0x7f0000003040)) lstat(&(0x7f00000030c0)='./file1\x00', &(0x7f0000003100)) getpgrp(0x0) geteuid() getgroups(0x0, &(0x7f0000004440)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004780), 0x0, 0x0) memfd_create(&(0x7f0000001bc0)='wlan1-{@!selfsystem:\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000001c00)={0x7}, 0x7) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") keyctl$set_reqkey_keyring(0xa, 0x0) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000440), 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[]}}, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000003c0)) poll(&(0x7f0000000180), 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000300)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000200), 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=@bridge_newneigh={0x1c}, 0x1c}}, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)=""/121, &(0x7f0000000180)=0x79) munlockall() getpeername$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000006c0)=0x14) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='memory.max\x00', 0x2, 0x0) syz_execute_func(0xffffffffffffffff) 03:38:05 executing program 4: keyctl$set_reqkey_keyring(0xe, 0x0) pipe(&(0x7f00000001c0)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000580)=0xc) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) fcntl$getown(0xffffffffffffffff, 0x9) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000240)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280)={@loopback}, &(0x7f00000002c0)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) geteuid() geteuid() getresuid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)) setresuid(0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) socket$nl_generic(0x10, 0x3, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a06b6969ef69dc00d9901837c4c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000003c0)={0x0, &(0x7f0000000300)}, 0x10) getcwd(&(0x7f00000004c0)=""/156, 0x9c) 03:38:07 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x8010000000000087) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200), 0x8400, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @loopback={0x0, 0x2c}}, 0x1c) 03:38:07 executing program 1: getgroups(0x0, &(0x7f00000003c0)) getgroups(0x0, &(0x7f0000000400)) mincore(&(0x7f0000ffa000/0x3000)=nil, 0x3000, &(0x7f00000008c0)=""/165) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000200), 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) pipe2(&(0x7f00000002c0), 0x0) io_setup(0x0, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000140)={'bridge_slave_0\x00', {0x2, 0x0, @broadcast}}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) getpid() ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000440)={0x0, 0x0, 0x0, &(0x7f0000000380)}) accept(0xffffffffffffff9c, &(0x7f0000000240)=@rc, &(0x7f0000000140)=0x80) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@loopback, @in=@local}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@dev, @in6=@remote}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@remote}}, 0xe8) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000740)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000b00)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000480), 0xc, &(0x7f0000000980)={&(0x7f0000000b40)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) io_setup(0x0, &(0x7f0000000180)) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000080)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @remote}, 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000004c0)) 03:38:07 executing program 2: epoll_create1(0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000005c0)) getgid() openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/187, 0xbb, 0x0, &(0x7f0000000280)=@abs, 0x18c) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000080)) rename(&(0x7f0000000600)='./file0\x00', &(0x7f00000007c0)='./file1\x00') openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b40)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000c40)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000023c0)) getresuid(&(0x7f0000002400), &(0x7f0000002440), &(0x7f0000002480)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000024c0)) stat(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)) fcntl$getown(0xffffffffffffffff, 0x9) getuid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002c00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000002bc0)='*\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002c40)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000002d40)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003380)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000033c0)={{{@in6=@mcast2, @in6}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f00000034c0)=0xe8) getpid() getresuid(&(0x7f0000003500), &(0x7f0000003540), &(0x7f0000003580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000035c0), &(0x7f0000003600)=0xc) stat(&(0x7f0000003640)='./file0\x00', &(0x7f0000003680)) getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003700)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000003800)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003840)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003880)={{{@in6, @in=@dev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000003980)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003bc0)) getuid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003c40), 0x0, 0x0) creat(&(0x7f0000000580)='./file0\x00', 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@local}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000009c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:38:07 executing program 4: clock_gettime(0x7, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000540), 0x0, 0x0) request_key(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffd) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000006c0)) chdir(&(0x7f0000000440)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300), &(0x7f0000000400)='rxrpc_s\x00', 0x0) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") mknod$loop(&(0x7f0000000780)='./file1\x00', 0x0, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000001880)) ustat(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000005c40), &(0x7f0000001940)=0x3) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000700)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000005c0)}}}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000980)='!\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000bc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) getuid() getgid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) lstat(&(0x7f0000001040)='./file1\x00', &(0x7f0000001080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001140)={&(0x7f0000001100)='keyring\x00'}, 0x10) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000002000)) stat(&(0x7f0000002080)='./file1\x00', &(0x7f00000020c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002300), &(0x7f0000002340)=0xc) geteuid() getpid() fstat(0xffffffffffffffff, &(0x7f0000002400)) 03:38:11 executing program 5: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x4b4103, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 03:38:11 executing program 4: munlockall() futex(&(0x7f0000000280), 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000000), 0x0) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x77359400}, &(0x7f0000000500)) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:38:11 executing program 1: pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f0000000400)='./file0\x00') openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000003c0)) write$P9_RAUTH(0xffffffffffffffff, &(0x7f00000017c0)={0xffffffeb}, 0x14) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000001880)}) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) llistxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/132, 0x84) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) writev(0xffffffffffffffff, &(0x7f0000000600), 0x82) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000900)=ANY=[]) lsetxattr$trusted_overlay_nlink(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)='trusted.overlay.nlink\x00', &(0x7f0000000540)={'U+', 0x6}, 0x28, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f00000007c0), 0x0, 0x0, 0xfffffffffffffffd) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f00000004c0), 0x0) finit_module(0xffffffffffffffff, &(0x7f0000001980)='selinuxnodevproc+\x00', 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000440)) syz_execute_func(&(0x7f00000001c0)="42805da0610fef69dc0fc201e5eeeeeeaa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f03e40e338e5e5a90175e7e7442e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c4a31122e90a746efafe9f7f") getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000580), &(0x7f00000005c0)=0x20) futex(&(0x7f0000000700), 0x0, 0x0, &(0x7f0000000740)={0x77359400}, &(0x7f0000000780), 0x0) socket(0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000300)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000280), 0x4) rt_sigprocmask(0x0, &(0x7f0000001a40), 0x0, 0x8) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000080)=ANY=[], 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') getpeername(0xffffffffffffffff, &(0x7f0000000880)=@hci, &(0x7f0000000900)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000009c0)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000bc0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c80)={@loopback, @multicast2}, &(0x7f0000000cc0)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000002ac0), 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002d00)={{{@in6, @in6=@mcast2}}, {{@in6=@ipv4}, 0x0, @in=@multicast1}}, &(0x7f0000002e00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002e40)={{{@in=@local, @in6}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000002f40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003000), &(0x7f0000003040)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003080)={'syzkaller1\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003140)={@dev, @remote}, &(0x7f0000003180)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000031c0)={{{@in, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f00000032c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004900)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000004a00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004a40)={@local}, &(0x7f0000004a80)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004bc0)={0x0, @broadcast, @loopback}, &(0x7f0000004c00)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004dc0)={{{@in=@remote, @in=@broadcast}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000004ec0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005000)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005040)={@loopback}, &(0x7f0000005080)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006540)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000006640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006680)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006740)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000006840)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000006880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000068c0)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006900)={{{@in=@rand_addr, @in6}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006a00)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006a40)={{{@in=@broadcast, @in6=@loopback}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000006b40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006c40)={{{@in=@remote, @in6}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000006d40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006e40)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000007000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007040)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000007080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000070c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000007100)={0x0, @empty, @broadcast}, &(0x7f0000007140)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007180)={{{@in6=@local, @in6}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000007280)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000007380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000073c0)=0x14) 03:38:12 executing program 3: keyctl$set_reqkey_keyring(0x4, 0x3) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000001c0)='timers\x00') sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000180), 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:12 executing program 0: fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000b40)) sched_setaffinity(0x0, 0x35c, &(0x7f0000000b80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={0xffffffffffffff9c, 0x28, &(0x7f0000000280)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000880)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0x5919ffbb2d3aa039) socket$inet_udplite(0x2, 0x2, 0x88) gettid() fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000480)) getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)) getpgid(0x0) getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f00000003c0)=0xc) getgroups(0x0, &(0x7f0000000340)) dup(0xffffffffffffffff) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380), 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000ac0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000840)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)={@ipv4={[], [], @rand_addr}}, &(0x7f0000000640)=0x371) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000940)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000009c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000a00)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a40)={0x0, @dev, @remote}, &(0x7f0000000a80)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000580)=0xfffffffffffffebe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000bc0)={'veth1_to_bridge\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@mcast1}, &(0x7f0000000dc0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000e00), &(0x7f0000000e40)=0x14, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000f40), &(0x7f0000000f80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001100)={{{@in, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f00000010c0)=0xffffffffffffff9b) getsockname$packet(0xffffffffffffffff, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000016c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001700)={@loopback}, &(0x7f0000001740)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001840), &(0x7f0000001880)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000019c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002080)={&(0x7f0000000080), 0xc, &(0x7f0000002040)={&(0x7f0000000580)=ANY=[]}}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000004c0)=""/156) accept$inet6(0xffffffffffffff9c, &(0x7f0000000700)={0xa, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x1c) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0), 0x4) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000240)) clock_adjtime(0x0, &(0x7f0000004480)) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000180), 0xfffffffffffffdee) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000680)={@loopback, @broadcast}, &(0x7f0000000400)=0xc) syz_open_dev$loop(&(0x7f0000000440)='/dev/loop#\x00', 0x0, 0x0) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:38:12 executing program 4: keyctl$join(0x1, &(0x7f0000000040)) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) io_setup(0x0, &(0x7f0000000180)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001580)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000015c0)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000016c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001700), &(0x7f0000001740)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001780)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000018c0)=0xe8) getgroups(0x0, &(0x7f0000001900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001940), &(0x7f0000001980)=0xc) getuid() getgroups(0x0, &(0x7f00000019c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003440)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003480)={{{@in6=@ipv4}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000003580)=0xe8) getresgid(&(0x7f00000035c0), &(0x7f0000003600), &(0x7f0000003640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003680), &(0x7f00000036c0)=0xc) lstat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)) getgroups(0x0, &(0x7f00000037c0)) gettid() geteuid() lstat(&(0x7f0000004d00)='./file0\x00', &(0x7f0000004d40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004e00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000004dc0)='&\x00', 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000004e40), &(0x7f0000004e80), &(0x7f0000004ec0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004f00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004f40), &(0x7f0000004f80)=0xc) fstat(0xffffffffffffffff, &(0x7f0000004fc0)) getpid() geteuid() getresgid(&(0x7f0000005040), &(0x7f0000005080), &(0x7f00000050c0)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000005140)={&(0x7f0000005100)='./file0\x00'}, 0x10) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000051c0)={{{@in6=@local}}, {{@in6=@mcast1}}}, &(0x7f00000052c0)=0xe8) getresgid(&(0x7f0000005300), &(0x7f0000005340), &(0x7f0000005380)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000340)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:38:12 executing program 1: futex(&(0x7f0000000040), 0xb, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000009c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") 03:38:13 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="2e0f93bb23000000c42191f6a415488f000045f90f31f30f511ec4c12916564c8f49d095e9c442791d845304000000c4a3fd00bacd00000013c4427d0e5d22") 03:38:13 executing program 4: pipe2(&(0x7f0000000080), 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") pipe2(&(0x7f0000000140), 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) 03:38:13 executing program 1: getrusage(0x1, &(0x7f0000000b40)) stat(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f38e3450f7777c19086d96235c935c97d197a0779fbc463fd7998b400ba000079aa8f296002f1e1460f0da11b000000010d64ac1e5dc4213c59fb05987b7f") pipe(&(0x7f00000008c0)) syz_genetlink_get_family_id$team(&(0x7f0000000940)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000009c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@mcast1, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001c00)={{{@in=@local, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000001d00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001f40)={{{@in=@dev, @in=@multicast2}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000002040)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000008a40), 0x0, 0x0, &(0x7f0000008bc0)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008c00)={'team0\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008c40)={0x0, @multicast2, @loopback}, &(0x7f0000008c80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000008cc0)={@remote}, &(0x7f0000008d00)=0x14) accept4(0xffffffffffffffff, &(0x7f0000000500)=@hci, &(0x7f0000000140)=0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000008e40)={{{@in, @in6=@ipv4}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000008f40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000009040)={{{@in6=@mcast1, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f0000009140)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009240)={{{@in=@multicast2, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000009340)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000009380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000093c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000009400)={@local}, &(0x7f0000009440)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000009600)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev}}, {{@in6}, 0x0, @in=@remote}}, &(0x7f0000009700)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000009740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000009780)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000009880), &(0x7f00000098c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000009900)={{{@in6=@loopback, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000009a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000009a40)={{{@in=@multicast1, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000009b40)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000009c40)={@loopback}, &(0x7f0000009c80)=0x163) accept$packet(0xffffffffffffffff, &(0x7f0000009cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009d00)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000009d40)={{{@in6, @in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000009e40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000000a100)={0x0, @multicast2, @remote}, &(0x7f000000a140)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000a280)={{{@in=@dev, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f000000a380)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000a3c0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f000000a580)={'vlan0\x00'}) getsockname(0xffffffffffffff9c, &(0x7f000000a5c0)=@hci, &(0x7f000000a640)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f000000a680)={'veth1_to_team\x00'}) accept(0xffffffffffffffff, &(0x7f000000a6c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000a740)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a780)={{{@in6=@remote, @in6=@remote}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f000000a880)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f000000a8c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a900)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f000000a940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000a980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f000000aa80)={{{@in=@loopback, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f000000ab80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f000000abc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000ac00)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000ac80)={'team0\x00'}) recvmmsg(0xffffffffffffff9c, &(0x7f000000d9c0), 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000e840)={&(0x7f0000000900), 0xc, &(0x7f000000e800)={&(0x7f000000dc00)=ANY=[]}}, 0x0) 03:38:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x10, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "de76dc76a8ffdcfebaf8a71bfd53a8eabd04a663fc8d8667b66707e6379fb8a459789683c2372fbfa5e2d5422be8ff13a14eca711e1bcb94326a21b270362e75bd2024baf31b6e451a6a50431ded3664"}, 0xd8) 03:38:14 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @thr={&(0x7f0000001440), &(0x7f0000000040)}}, &(0x7f0000000300)) memfd_create(&(0x7f0000000400)='/selinux/avc/cache_threshold\x00', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000700)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000740)={'team0\x00'}) getpeername(0xffffffffffffffff, &(0x7f0000000780)=@hci, &(0x7f0000000800)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000840)={{{@in6, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000000ac0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000bc0)=0x14, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000440), 0xc, &(0x7f0000000e80)={&(0x7f0000000c00)=ANY=[]}}, 0x0) clock_gettime(0x0, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000f00)={'syz0\x00'}, 0x45c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000540)}) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000b40)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000940)) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0a50fef69dc0f01ee0dce41ff0fc4a33d062900770f78990feefa6b2179660f38302fe5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:20 executing program 5: clock_nanosleep(0x2, 0x0, &(0x7f0000000980), &(0x7f0000000500)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da01245cf0f01ee0f400f0f380bc2470f006f92380f49df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f46f0c92e470f9e24b6d6074ba503") 03:38:20 executing program 4: getpgid(0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000780)) syz_open_procfs(0x0, &(0x7f0000000700)="6d07000000730010e03cecec874a5999209b863b8a4161eea3790b9794e467fb81d72bce4814a8c16eab8d0be97937b49c9f8a8ec5811b4cae7e16cbdf69fc41c7265f5e3d963000a90fff3fdf0f709153f7aa06a4626cc849") openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/commit_pending_bools\x00', 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='/dev/null\x00'}, 0xa7) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, &(0x7f0000000c00)=""/98) connect$unix(0xffffffffffffffff, &(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000500)=0x150) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001380)={{{@in6=@remote, @in=@local}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000001480)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)) getuid() lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000540)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000015c0)) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001640)={{{@in=@rand_addr, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000001740)=0xe8) getegid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002b80)) stat(&(0x7f0000002d00)='./file0\x00', &(0x7f0000002d40)) gettid() lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) lstat(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002f40)) lstat(&(0x7f0000002f80)='./file0/file0\x00', &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000030c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000031c0)=0xe8) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003980), &(0x7f00000039c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003a00), &(0x7f0000003a40)=0xc) getgid() openat$null(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/null\x00', 0x0, 0x0) getpid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003ac0)={{{@in6=@remote, @in=@remote}}, {{@in6=@mcast1}}}, &(0x7f0000003bc0)=0xe8) getgid() gettid() lstat(&(0x7f0000003c00)='./file0\x00', &(0x7f0000003c40)) stat(&(0x7f0000003cc0)='./file0\x00', &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004d40)={{{@in6=@loopback, @in=@local}}, {{}, 0x0, @in6}}, &(0x7f0000004e40)=0xe8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000004c0)) lstat(&(0x7f0000004f40)='./file0\x00', &(0x7f0000004f80)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006400)) stat(&(0x7f0000006440)='./file0/file0\x00', &(0x7f0000006480)) lstat(&(0x7f0000006500)='./file0\x00', &(0x7f0000006540)) gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000065c0)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f00000066c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a450f6907c44379dfb9d6adbe90dfbbd89f7f") 03:38:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x10, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "de76dc76a8ffdcfebaf8a71bfd53a8eabd04a663fc8d8667b66707e6379fb8a459789683c2372fbfa5e2d5422be8ff13a14eca711e1bcb94326a21b270362e75bd2024baf31b6e451a6a50431ded3664"}, 0xd8) 03:38:20 executing program 3: prctl$setname(0xf, &(0x7f00000001c0)="2f6465762f6d69646923003daeae65f1dd09759bad30e47f75b39711f9e0034f4882de26ab84e86acdfee240fbf0b75a700104448e01f47d6955d42a83f631f316de9241612a6b9be2656f43f1254ca809823601d85ec3d5aa28f390a886a24d71a03a4331208c6051ff76c8886409d099dd06f84e") seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syslog(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000003c0)="f942805da0690a0d01eece41ff0f2e360f381e0e370f38211ac4410feefac462fd1e28a6f2f041f61041b87545d745281b1bc4c4212972e0891e5d1e5db7c44379dfb9d6adbe90dfe29c4b7f") openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000280), 0x10) prctl$setfpexc(0xc, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000340)=0x10) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000540)={'team_slave_0\x00'}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)) 03:38:20 executing program 0: clock_gettime(0x0, &(0x7f0000000240)) setitimer(0x0, &(0x7f0000000540)={{0x0, 0x2710}, {0x77359400}}, &(0x7f0000000580)) getpid() openat$rtc(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f00000007c0), &(0x7f0000000800)=0x14) getpeername(0xffffffffffffffff, &(0x7f00000009c0)=@can, &(0x7f0000000a40)=0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000a80)={'ip6gretap0\x00'}) accept$packet(0xffffffffffffff9c, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@dev, @in=@local}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@multicast2, @in=@broadcast}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000fc0)={@dev, @multicast1}, &(0x7f0000001000)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000004c80), 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004d80)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000004dc0), &(0x7f0000004e00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e40)={{{@in=@multicast2}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000004f40)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000005340)={&(0x7f0000004f80)=@hci, 0x80, &(0x7f0000005240), 0x0, &(0x7f0000005280)=""/129, 0x81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000005380)={{{@in6=@remote, @in6=@dev}}, {{}, 0x0, @in6=@local}}, &(0x7f0000005480)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000054c0)={{{@in6=@local, @in6}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000055c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005700)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005800), &(0x7f0000005840)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000005880)={'sit0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000058c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000059c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005e80)={{{@in=@multicast1, @in=@local}}, {{@in=@multicast2}}}, &(0x7f0000005f80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006000)={{{@in=@multicast1, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@remote}}, &(0x7f0000006100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ac0)={{{@in=@remote, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000006240)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f00000062c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006300)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006400)={{{@in, @in6}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000006500)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006600)={@mcast2}, &(0x7f0000006640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006680)={{{@in6=@local, @in=@dev}}, {{@in=@local}, 0x0, @in6}}, &(0x7f0000006780)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") 03:38:20 executing program 1: epoll_create1(0x0) socket$netlink(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000280)) fcntl$getown(0xffffffffffffffff, 0x9) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ocfs2_dlmfs\x00', 0x0, &(0x7f0000000140)='#mime_type\x00') keyctl$session_to_parent(0x12) fstat(0xffffffffffffff9c, &(0x7f0000000380)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302f400fc77a20450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") 03:38:21 executing program 1: getpid() openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)={0xb, 'syz0\x00', 'syz1\x00', 'syz0\x00'}, 0x118) setxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.origin\x00', &(0x7f0000000500)='y\x00', 0x2, 0x0) memfd_create(&(0x7f0000000240)='peth1lo\\systemselinux\x00', 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)) write$P9_RWALK(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xffffffffffffff2d) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) syz_execute_func(&(0x7f00000002c0)="428055a08e6969ef69dc00d9d0d3c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5dc4632d5c271e9f7f") ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000200)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000540)) 03:38:21 executing program 4: rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000440)=""/224) select(0x40, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") pipe2$9p(&(0x7f0000000040), 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000840)=""/76, 0x4c}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000240)="586df75cc63785c4a959af985219f8ac", 0x10) io_setup(0x0, &(0x7f0000000280)) lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'bond_slave_1\x00'}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000a00), &(0x7f0000000a40)=0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000780)={&(0x7f0000000680)=""/242, 0xf2}}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000ac0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000a80), 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[]}}, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000800), 0x4) timerfd_create(0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000340)={0x0, 0x1, 0x6, @link_local}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000008c0)={0x0, @multicast1}, &(0x7f0000000900)=0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) io_submit(0x0, 0x0, &(0x7f0000001bc0)) getresuid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f0000000580)) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) getgroups(0x0, &(0x7f0000000900)) fchown(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000380)) memfd_create(&(0x7f0000000600)='%em0\\\x00', 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 03:38:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x10, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "de76dc76a8ffdcfebaf8a71bfd53a8eabd04a663fc8d8667b66707e6379fb8a459789683c2372fbfa5e2d5422be8ff13a14eca711e1bcb94326a21b270362e75bd2024baf31b6e451a6a50431ded3664"}, 0xd8) 03:38:22 executing program 4: eventfd(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fstat(0xffffffffffffffff, &(0x7f00000005c0)) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000004c0)=""/69, &(0x7f00000003c0)=0x45) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000440)='cgroup.subtree_control\x00', 0x2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000780)) openat$full(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/full\x00', 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) syz_open_procfs(0x0, &(0x7f0000000640)='smaps_rollup\x00') ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000002c0)) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f00000006c0)) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) timerfd_create(0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000e40)=@nat={'nat\x00', 0x1b, 0x5, 0x510, 0x380, 0x380, 0x0, 0x270, 0x270, 0x640, 0x640, 0x640, 0x640, 0x640, 0x5, &(0x7f0000000b00), {[{{@uncond, 0x0, 0xc8, 0x110}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv6=@dev}}}, {{@uncond, 0x0, 0xc8, 0x110}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@ipv4={[], [], @local}, 'eql\x00'}}}, {{@uncond, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@loopback, @port, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv4=@multicast2}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x570) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)) symlink(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='./file0\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000400), 0xc, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000700)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}}, 0x5c) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") vmsplice(0xffffffffffffffff, &(0x7f0000000a80), 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000680)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000015c0)="2e2f6367726f75702f73797a30001deb1fc7e7dcaf06a873f9130dfc00d2da50549dfa62da5404b74aa4d073c498b64f097151ce50b13d00098ede1fd13d062747e39c0f48b0753529d0b370b92bc9fd9c7f9d1cacd1279525e2e194b587817ce458f280a5ccc645d779adb1a571a06b5d03a3a49b34ff34a287d142d5fbbf5e01d603d7e7671ce1454c616bad2626e69ba3057e6042f6fae2f6b492d6d0b52b2e7464f2ec481b83ffcd488367e9a881a65eed189cee35ebd4d1a618811bf129601a", 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000480)) 03:38:22 executing program 1: prctl$void(0x1f) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000840), 0xc9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@dev, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xfffffffffffffe6d) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x50, &(0x7f0000000700)}, 0x10) epoll_create(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/loop-control\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000580)="42805da0ad5252ef84dc3df83df8eece67f3406e660c54823dc3c381768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:22 executing program 4: keyctl$set_reqkey_keyring(0x2, 0xfffffffb) clock_gettime(0x0, &(0x7f0000000400)) pipe(&(0x7f0000000180)) chroot(&(0x7f0000000040)='./file0\x00') socket$inet6_udp(0xa, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peekuser(0x3, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:38:22 executing program 3: pipe2(&(0x7f0000000000), 0x897a583f93a15785) accept(0xffffffffffffffff, 0x0, &(0x7f0000000180)=0xfdf1) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000680)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000005c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005c80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000005cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005d00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005e00)={{{@in6=@mcast2, @in=@dev}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000005f00)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006000)={'ip6gretap0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006040)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006080)={'team0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000060c0)={{{@in=@remote, @in=@loopback}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@multicast2}}, &(0x7f00000061c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000063c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000006400)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000006480), &(0x7f00000064c0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006580)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000065c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006600)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006740)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006780)={{{@in=@local, @in=@loopback}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000006880)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000068c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000006900)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006940)={'ipddp0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006980)={'bridge0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000069c0)={@loopback, @loopback}, &(0x7f0000006a00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006a40), &(0x7f0000006a80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000006ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006b00)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000006b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006bc0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006c00)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006dc0)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006f80)={'veth1_to_bond\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000006fc0)={{{@in6=@ipv4={[], [], @loopback}, @in=@local}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f00000070c0)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000007100)={@dev, @multicast2}, &(0x7f0000007140)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000007180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000071c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000007200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000007240)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007280)={{{@in6=@mcast1, @in=@loopback}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000007380)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000073c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000007400)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000007440)={@remote}, &(0x7f0000007480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000074c0)={'team0\x00'}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000007500)={@rand_addr, @rand_addr}, &(0x7f0000007540)=0xc) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0c20f460f46dc0f01ee2632206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6828adfe2c579987e") 03:38:29 executing program 5: set_tid_address(&(0x7f0000000a00)) rt_sigtimedwait(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)={0x0, 0x989680}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/224) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f0000000640)=0xc) getgid() stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000740)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000500)) getegid() setgroups(0x0, &(0x7f0000000280)) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000740), 0x4) clock_gettime(0x0, &(0x7f0000000840)) pselect6(0x40, &(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000880), &(0x7f0000000900)={&(0x7f00000008c0), 0x8}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa37b90f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c48235905c5f13c4c3916efafe9f7f") fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000280)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) 03:38:29 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000200)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f00000018c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001900)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001980)) getuid() fstat(0xffffffffffffffff, &(0x7f00000019c0)) getpgid(0xffffffffffffffff) getuid() getgid() getpid() stat(&(0x7f0000002c80)='./file0\x00', &(0x7f0000002cc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d40), &(0x7f0000002d80)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002dc0), &(0x7f0000002e00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002e40)={{{@in6=@mcast1, @in=@broadcast}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000002f40)=0xe8) getresgid(&(0x7f0000002f80), &(0x7f0000002fc0), &(0x7f0000003000)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003040), &(0x7f0000003080)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000030c0), &(0x7f0000003100)=0xc) socket$nl_route(0x10, 0x3, 0x0) gettid() getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004940), &(0x7f0000004980)=0xc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004b40), 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, &(0x7f0000004d80), &(0x7f00000005c0)=0x3e) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000040)) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=""/49, &(0x7f0000000240)=0x31) 03:38:29 executing program 1: getrusage(0x0, &(0x7f0000000340)) memfd_create(&(0x7f0000000080)='ns/pid\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000001c0)) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f0000000300)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000240)) clock_getres(0x0, &(0x7f00000000c0)) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) gettid() epoll_create(0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ustat(0x0, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) set_tid_address(&(0x7f0000000200)) add_key(&(0x7f00000005c0)='blacklist\x00', &(0x7f0000000600), &(0x7f0000000680), 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000400)='big_key\x00', &(0x7f00000004c0), &(0x7f0000000540), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000780)="42805da0c10fef69dc0f01ee660f3a608600088041cb913591913d06440f18400e770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0c60fef69dc0f01eece73fe550fc60079380f38211af3c46178138cd466d12b24c481b5e5bc2b0000002167f00fbab204000000ca6b2179da5ce5417545bde02e1a1a010d64ac1e5d31a3b744dbe271fb0703") 03:38:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0x10, &(0x7f0000000140)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x0, "de76dc76a8ffdcfebaf8a71bfd53a8eabd04a663fc8d8667b66707e6379fb8a459789683c2372fbfa5e2d5422be8ff13a14eca711e1bcb94326a21b270362e75bd2024baf31b6e451a6a50431ded3664"}, 0xd8) 03:38:29 executing program 0: keyctl$set_reqkey_keyring(0x7, 0x200000006) pipe(&(0x7f00000001c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getpid() fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001800)) gettid() getpgid(0x0) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) getgid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in=@loopback, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000740)) getpgid(0x0) getuid() getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0), &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000000940)=0xe8) getgroups(0x0, &(0x7f0000000980)) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000ec0)={{{@in6, @in=@broadcast}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000fc0)=0xe8) lstat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000010c0)={{{@in6=@local, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000011c0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in=@loopback, @in6=@loopback}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001300)=0xe8) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001400)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001440)={{{@in6=@mcast1, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000001540)=0xe8) getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000001700), 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$key(0xf, 0x3, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000540)={@loopback}, &(0x7f0000000440)=0x14) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @local, @multicast1}, &(0x7f0000000100)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000580)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0124fefeddc0f01eea873fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1a8f0818ef0d0e0000000044dbe271fb0703") 03:38:29 executing program 1: getpid() getpgid(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$unix(0x1, 0x0, 0x0) syz_execute_func(&(0x7f00000001c0)="428055a03b6969ef69dc00d9f3ac69203737c3397c05bd060f38211a40a564a70f277a9e400f01ede5e54175458f8858cf0500000081012e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") 03:38:29 executing program 1: getitimer(0x4, &(0x7f0000000540)) ustat(0x0, &(0x7f0000000280)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001ec0)='/dev/vga_arbiter\x00', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f00000003c0)=0xff88) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @loopback, @multicast1}, &(0x7f0000000640)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000680)={@mcast1}) io_setup(0x0, &(0x7f0000000400)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001ac0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000400)) capget(&(0x7f00000004c0), &(0x7f0000000500)) clock_gettime(0x0, &(0x7f0000000080)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000440)) 03:38:30 executing program 4: wait4(0x0, &(0x7f0000000080), 0x0, &(0x7f0000000940)) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000900)='/selinux/checkreqprot\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001c00), 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000480)=0xc) inotify_init1(0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000004c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000680)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in=@rand_addr, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @broadcast}}}}, &(0x7f0000000440)=0xe8) openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)={@remote, @multicast1}, &(0x7f0000000580)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000000640), &(0x7f0000000740)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000780)={0x0, @remote, @broadcast}, &(0x7f00000007c0)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000800)={@rand_addr, @multicast2}, &(0x7f0000000840)=0xc) 03:38:30 executing program 1: clock_gettime(0xffffffffffffffff, &(0x7f0000000740)) socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0), 0x10) keyctl$set_reqkey_keyring(0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000500)=0xc) pipe(&(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000400), &(0x7f0000000480)=0x4) syz_execute_func(&(0x7f00000001c0)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=ANY=[]}}, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000340)) getpgrp(0xffffffffffffffff) getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@rand_addr, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000300)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000540)=""/116, &(0x7f00000005c0)=0x74) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000001d80)='vcan0\x00'}, 0x30) getresuid(&(0x7f0000001e00), &(0x7f0000001e40), &(0x7f0000001e80)) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001ec0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001f00), &(0x7f0000001f40)=0xc) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'os2.', 'ppp1ppp0+\'!/md5sum&\x00'}, &(0x7f0000000240)='vcan0\x00', 0x6, 0x0) 03:38:30 executing program 4: clock_gettime(0x0, &(0x7f0000000080)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:38:31 executing program 1: getitimer(0x0, &(0x7f0000000380)) pkey_alloc(0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) munmap(&(0x7f000018f000/0x4000)=nil, 0x4000) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x8) eventfd2(0x0, 0x0) pipe2(&(0x7f0000000480), 0x0) getresuid(&(0x7f00000007c0), &(0x7f0000000900), &(0x7f0000000940)) getgroups(0x0, &(0x7f0000000980)) getresgid(&(0x7f0000000b00), &(0x7f0000000b40), &(0x7f0000000b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c40), &(0x7f0000000c80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40), &(0x7f0000000d80)=0xc) lstat(&(0x7f0000000dc0)='./file0\x00', &(0x7f00000009c0)) fstat(0xffffffffffffffff, &(0x7f0000000e80)) getuid() stat(&(0x7f0000000f00)='./file0\x00', &(0x7f0000000f40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001040), &(0x7f0000001080)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000010c0)={{{@in6, @in=@remote}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f00000011c0)=0xe8) lstat(&(0x7f0000001200)='./file0\x00', &(0x7f0000001240)) lstat(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)) getgid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000001980)=ANY=[], 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000004c0)={{0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, {0xa, 0x0, 0x0, @dev}}, 0x5c) fchmod(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@mcast1, @in=@multicast1}}, {{@in6=@mcast2}}}, &(0x7f0000000680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xed02aecf) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000800), &(0x7f0000000840)=0xc) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000003c0), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000002c0)) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:38:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000002c0)={@in, 0x0, 0x0, 0x0, "1920f619f59f4a24c21f809e4791620ecbd84ea1afac415e3ca410c3a7ff16a003595bfade3f71fc7ca0f1786f60cba1039dc2609b00386d39c61cb1de3f29e334272da125dd3e67f7517e11801e0b10"}, 0xd8) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "59c10c21ff451e7b8c04c4211f6329c801f059854c84cb9d28e77b48e8df66099707fb3f86befe3f87404a24afbf9216b9f191cac292f36ba5b86969bf230319", "2c7ffbaa78f960f1a1dc9613156a4a6da5c765434340234ff7d1857d1f392677e473b94b7beae95a6d51416b9e0d7977f03c02bfa8ca41310d994d8c0d17ad49", "162612efc86e38981e035417deeb2ba7c3152ae994b9ea6001fb1192375f6bce"}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000000c0)) mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mremap(&(0x7f0000d88000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000b6f000/0x1000)=nil) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) syz_execute_func(&(0x7f00000003c0)="428055a03b6969ef69dc00d9c421e5f6ad9600000069203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") syz_open_procfs(0x0, &(0x7f00000001c0)='cpuset\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000b6e000/0x3000)=nil, 0x3000}, &(0x7f0000000240)=0x10) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:38:37 executing program 5: getpid() syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/ipc\x00') openat(0xffffffffffffff9c, &(0x7f00000027c0)='./file0\x00', 0x0, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002b00), &(0x7f0000002b40)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b80)={{{@in6=@dev, @in6}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000002c80)=0xe8) getgroups(0x0, &(0x7f0000002cc0)) getresuid(&(0x7f0000002f40), &(0x7f0000002f80), &(0x7f0000002fc0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003000), &(0x7f0000000340)=0x1fd) getresuid(&(0x7f0000003080), &(0x7f00000030c0), &(0x7f0000003100)) lstat(&(0x7f0000003140)='./file0\x00', &(0x7f0000003180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003200)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000003300)=0xe8) getegid() lstat(&(0x7f0000003780)='./file0\x00', &(0x7f00000037c0)) getgroups(0x0, &(0x7f0000003840)) lstat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003940)={{{@in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000003a40)=0xe8) getegid() fstat(0xffffffffffffffff, &(0x7f0000003a80)) getgroups(0x0, &(0x7f0000003b00)) getresuid(&(0x7f0000004240), &(0x7f0000004280), &(0x7f00000042c0)) fstat(0xffffffffffffffff, &(0x7f0000004300)) getresuid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) stat(&(0x7f0000004440)='./file0\x00', &(0x7f0000004480)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000004500)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000004600)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004640), &(0x7f0000004680)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) lstat(&(0x7f0000004780)='./file0\x00', &(0x7f00000047c0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000006e80)) geteuid() getresgid(&(0x7f0000006f00), &(0x7f0000006f40), &(0x7f0000006f80)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:38:37 executing program 1: get_robust_list(0x0, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f00000000c0), 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f00000002c0)=0x18) seccomp(0x0, 0x0, &(0x7f0000000100)) ustat(0x0, &(0x7f0000001200)) clock_gettime(0x0, &(0x7f00000005c0)) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c00)="428055a0aa878769ef69dc00d9ce200441ffff1837c423fbf07b030d0f38211ac4c19086fbd9f28fc9c90feefa4e2179fb237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:38:37 executing program 2: fsync(0xffffffffffffffff) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) getrandom(&(0x7f0000000200)=""/148, 0x94, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@mcast2, @in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() getresgid(&(0x7f0000000740), &(0x7f00000056c0), &(0x7f0000005700)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180)) lstat(&(0x7f0000005780)='./file0/file0\x00', &(0x7f00000057c0)) fstat(0xffffffffffffffff, &(0x7f0000005840)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000058c0), &(0x7f0000005900)=0xc) getresuid(&(0x7f0000005940), &(0x7f0000005980), &(0x7f00000059c0)) getresgid(&(0x7f0000005a00), &(0x7f0000005a40), &(0x7f0000005a80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005ac0)) getresuid(&(0x7f0000005b00), &(0x7f0000005b40), &(0x7f0000005b80)) getgroups(0x0, &(0x7f0000005bc0)) syz_execute_func(&(0x7f0000001680)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:38:37 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff}, 0x373) dup(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) gettid() getpgrp(0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000028c0)='/dev/rtc0\x00', 0x0, 0x0) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002cc0)={{{@in=@multicast1, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000002dc0)=0xe8) lstat(0xffffffffffffffff, &(0x7f0000000300)) getresuid(&(0x7f0000002e80), &(0x7f0000002ec0), &(0x7f0000002f00)) getresgid(&(0x7f0000002f40), &(0x7f0000002f80), &(0x7f0000002fc0)) fstat(0xffffffffffffffff, &(0x7f0000003000)) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000044c0)={{{@in=@multicast1, @in6}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000045c0)=0xe8) getgid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004600)={{{@in6=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000004700)=0xe8) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000004780)) getuid() getgroups(0x0, &(0x7f0000000080)) getuid() getgid() getuid() lstat(&(0x7f0000005d80)='./file0\x00', &(0x7f0000005dc0)) getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005f80)={{{@in6=@mcast2, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000006080)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000280)) stat(&(0x7f0000007780)='./file0\x00', &(0x7f00000077c0)) getgid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007840)={{{@in6, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000007940)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="428055a0610fef69dce9d92a5c41ff0f1837370f38211ac4c482fd2520410feefa4e2179fbe5f54175455de0932ebc2ebc0d64ac1e5d9f7f") 03:38:39 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() mremap(&(0x7f0000d8a000/0x4000)=nil, 0x4000, 0x3000, 0x0, &(0x7f0000b6f000/0x3000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@alg, &(0x7f0000000180)=0x80, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000500)={@remote}, &(0x7f0000000540)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@local, @in=@rand_addr}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000b40)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000bc0)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000980)=0xfffffffffffffe32) accept4(0xffffffffffffffff, &(0x7f00000010c0)=@xdp, &(0x7f0000001140)=0x80, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001180)={0x0, @local, @dev}, &(0x7f00000011c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001380)=0x14) accept(0xffffffffffffffff, &(0x7f0000001480)=@xdp, &(0x7f0000001500)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001580)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001680)={@multicast2, @multicast1}, &(0x7f00000016c0)=0xc) accept4(0xffffffffffffffff, &(0x7f0000001700)=@can, &(0x7f0000001780)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000017c0)={@dev}, &(0x7f0000001800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001840)={0x0, @dev, @loopback}, &(0x7f0000001880)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000018c0)={'team0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000480)="428055a03b6969ef69dc00d9fbfb69203737c3397c05bd060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e660fe095000000003ef0f6585501ee31a3b786e29885c4227992dd289f9f") lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:38:39 executing program 1: set_tid_address(&(0x7f00000002c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) getpgid(0x0) getpid() clock_gettime(0x0, &(0x7f0000000840)) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getgid() stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000880), &(0x7f00000008c0)) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:38:39 executing program 4: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000340)={0x0, 0x0, 0xb10f0000}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300)='/dev/null\x00'}, 0x30) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000500)) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f00000002c0)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000240)) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)=""/230, &(0x7f0000000280)=0xe6) write$nbd(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'team0\x00'}) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getpid() seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000140)}) syz_execute_func(&(0x7f0000000040)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @multicast1}, 0xc) 03:38:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getgid() lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000cc0)) getresgid(&(0x7f0000000300), &(0x7f0000000180), &(0x7f00000001c0)) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000680)=0xc) socketpair(0x0, 0x0, 0x0, &(0x7f00000004c0)) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000400)=@generic) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000500), &(0x7f0000000540)=0x30) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="428055a0fa6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9e5e54175452b74742e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000001c0)=""/134, &(0x7f0000000280)=0x86) socket$inet6_udp(0xa, 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x0, 0x0) prctl$getreaper(0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000006c0)={@loopback, @dev}, &(0x7f0000000700)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000740)={@dev, @local}, &(0x7f0000000780)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000007c0)={'irlan0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000840)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'bond0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000900)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000a40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005640), 0x0, 0x0, &(0x7f0000005840)={0x0, 0x1c9c380}) getpeername$packet(0xffffffffffffffff, &(0x7f0000005880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000058c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006800)={{{@in=@dev, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000006900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006a80)={{{@in6=@ipv4, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000006b80)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000006bc0)=@hci, &(0x7f0000006c40)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000006c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006cc0)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000006dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000006e00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000006e40)={@local}, &(0x7f0000006e80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006ec0)={@dev, @multicast2}, &(0x7f0000006f00)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006f40)={'veth1_to_team\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006f80)={{{@in=@rand_addr, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f0000007080)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007480)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000007580)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007740)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@local}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000007840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007900)={{{@in=@dev, @in=@remote}}, {{@in6=@loopback}}}, &(0x7f0000007a00)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000007a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000007a80)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000007ac0)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000007bc0)=0xe8) 03:38:39 executing program 1: keyctl$set_reqkey_keyring(0x10, 0x2c2de6e1) getpgid(0x0) gettid() getpid() getpgid(0xffffffffffffffff) epoll_create1(0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0320fef69dc0f01eece73fe19fa380f38211af3f242d2be00000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:38:40 executing program 4: eventfd(0x0) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000002c0)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000400)='/dev/keychord\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)="0e21496d696d655f74797065776c616e3000", 0xffffffffffffff9c}, 0x10) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f00000005c0)=0xe8) getpgid(0x0) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001900), &(0x7f0000001940)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@mcast2, @in=@broadcast}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000001a80)=0xe8) gettid() stat(&(0x7f0000001ac0)='./file0\x00', &(0x7f0000001b00)) getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b80), &(0x7f0000001bc0)=0xc) getpgid(0xffffffffffffffff) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000033c0)) getresuid(&(0x7f0000003400), &(0x7f0000003440), &(0x7f0000003480)) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f00000034c0)) getpgid(0x0) stat(&(0x7f0000003bc0)='\x00', &(0x7f0000003c00)) getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000052c0)={{{@in6=@local, @in6=@local}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f00000053c0)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0b66969ef69b0dede41ffaa322333334e41ff0f18373766460f3828523044c1b086d9f28fc9f083170079fbc463fd7998b400ba0000ffff75452e0ac4010d5064ac1ef2832433ae5da314b706e298987b7f") setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f00000000c0), 0x4) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19006d96b8fc9c90feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:38:40 executing program 1: eventfd2(0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000180)) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000200)=""/4) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x234, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) prctl$setendian(0x14, 0x0) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:38:40 executing program 4: recvfrom$packet(0xffffffffffffffff, &(0x7f0000000080)=""/44, 0x2c, 0x0, 0x0, 0x0) clock_getres(0x0, &(0x7f0000000640)) pipe2(&(0x7f0000000180), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)) getuid() getgid() fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000018c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@dev}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f00000019c0)=0xc) getpid() stat(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) getresgid(&(0x7f0000001ac0), &(0x7f0000001b00), &(0x7f0000001b40)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003240)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003280)={{{@in=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000003380)=0xe8) getegid() getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000033c0)={{{@in6=@mcast1, @in=@local}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f00000034c0)=0xe8) getgroups(0x0, &(0x7f0000003500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003980)) lstat(&(0x7f00000039c0)='./file0\x00', &(0x7f0000003a00)) lstat(&(0x7f0000003a80)='./file0\x00', &(0x7f0000003ac0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004240), &(0x7f0000004280)=0xc) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) stat(&(0x7f0000004380)='./file0\x00', &(0x7f00000043c0)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000004440)) lstat(&(0x7f00000044c0)='./file0\x00', &(0x7f0000004500)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004580)={{{@in=@rand_addr, @in6=@local}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000004680)=0xe8) stat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004780)) stat(&(0x7f00000047c0)='./file0\x00', &(0x7f0000004800)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000600)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f3d233d23410feefa8ea49a3917390f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:38:46 executing program 5: getegid() stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000580)) getegid() getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) getgroups(0x0, &(0x7f0000000800)) stat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)) getgroups(0x0, &(0x7f0000000900)) mincore(&(0x7f0000ffa000/0x2000)=nil, 0x2000, &(0x7f0000000140)=""/48) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000340)={0x0, {0x2, 0x0, @multicast2}, {}, {0x2, 0x0, @local}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)='dummy0\x00'}) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) accept$packet(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000480)={0x0, &(0x7f0000000440)}, 0x10) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000280), &(0x7f0000000180), 0x0, 0xfffffffffffffffc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='pids.events\x00', 0x0, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000200)={0x7}, 0x7) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") 03:38:46 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000840)='/dev/full\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000b00)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000700)=0x9f3f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x4000000000000006, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000740), 0xb6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0x1) getgroups(0x0, &(0x7f0000000800)) lstat(&(0x7f0000000b40)='./file0/file0\x00', &(0x7f0000000c00)) getegid() getegid() lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)) lstat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) getgroups(0x0, &(0x7f0000000e00)) getegid() getresgid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) add_key(&(0x7f0000000580)='dns_resolver\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffff8) request_key(&(0x7f0000000480)='rxrpc\x00', &(0x7f0000000800), &(0x7f0000000600)="2e76626f786e657431406b657972696e672d6d696d655f74797065757365727d7b7431252f706f7369785f61636c5f6163636573736d696d655f747970653a776c616e30776c616e31a07070703176626f78e575ead47573657200000000000000", 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000a40)=0xe8) geteuid() geteuid() fstat(0xffffffffffffffff, &(0x7f0000000a80)) setxattr$system_posix_acl(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)='system.posix_acl_access\x00', &(0x7f0000000b00)=ANY=[], 0x0, 0x0) syz_execute_func(&(0x7f0000001000)="428055a0510fef69dc0f01ee0dce0ecf41cb410f38053f660f3825cf260f4fb6fd000000a33d062900770f78998ac53d674141b11c1d0b00000244fe80cc39390f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) getgid() openat$full(0xffffffffffffff9c, &(0x7f0000000680)='/dev/full\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f00000006c0), 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000b80)='keyring\x00', &(0x7f0000000bc0), 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) 03:38:46 executing program 4: epoll_create(0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@remote, @in6=@remote}}, {{@in6=@dev}}}, &(0x7f0000000340)=0xe8) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000380)) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000680)='self\x00'}, 0x30) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)) stat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000880)) getuid() fstat(0xffffffffffffffff, &(0x7f00000008c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002140)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002180)={{{@in=@rand_addr, @in6}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000002280)=0xe8) getresgid(&(0x7f00000022c0), &(0x7f0000002300), &(0x7f0000002340)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in6, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000024c0)=0xe8) getgroups(0x0, &(0x7f0000002500)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002940)={{{@in=@multicast2, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000002a40)=0xe8) lstat(&(0x7f0000002a80)='./file0\x00', &(0x7f0000002ac0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b80)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x19, &(0x7f0000002b40)=')mime_type-)eth0nodevlo@\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@mcast1, @in=@rand_addr}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000002cc0)=0xe8) getgroups(0x0, &(0x7f0000002d00)) getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002d40)={{{@in=@remote, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002e40)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002ec0)={0x0, 0xffffffffffffffff, 0x0, 0x24, &(0x7f0000002e80)='bdevvmnet1GPLvboxnet0procwlan0wlan0\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002f00)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000003000)=0xe8) stat(&(0x7f0000003040)='./file0\x00', &(0x7f0000003080)) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:38:46 executing program 2: getrandom(&(0x7f0000000200)=""/148, 0x340, 0x0) clock_gettime(0x0, &(0x7f0000000540)) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f0000000440), &(0x7f0000000540), 0x0, 0xfffffffffffffffb) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000380)={'syz_tun\x00', {0x2, 0x0, @rand_addr}}) rt_sigpending(&(0x7f00000000c0), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000480)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000500)=""/17) getegid() keyctl$link(0x8, 0x0, 0x0) getegid() syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000006c0)={0xa0}, 0xa0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000140), 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000580)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x90) syz_execute_func(&(0x7f0000000640)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") pipe2(&(0x7f0000000040), 0x0) syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:38:48 executing program 0: unshare(0x10000100) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) syz_execute_func(&(0x7f0000000540)="42805da0bdc038016dfa19fa762b4242218f8978972bf0817e768cc80000000081b5e5b82b870000002167670fbab204000000ca4b2178dae5e54175450f2e1ac46279db6744c4e1e1666f0771fb0703") socket$nl_generic(0x10, 0x3, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000080)) rt_sigpending(&(0x7f0000000040), 0x8) pipe2(&(0x7f0000000080), 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000480)={{}, 'syz0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpgid(0x0) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, @loopback}, 0x10) creat(&(0x7f0000000540)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000180)='syz1\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=@raw, &(0x7f0000000440)='GPL\x00', 0x0, 0xaf, &(0x7f0000000280)=""/175}, 0x48) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) io_setup(0x0, &(0x7f00000000c0)) io_submit(0x0, 0x0, &(0x7f00000005c0)) fcntl$getflags(0xffffffffffffffff, 0x0) 03:38:48 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x100fff, 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000800)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001bc0)=0x14) syz_execute_func(&(0x7f00000001c0)="42805da0ad5252ef84dc0f01eece67f3406e660c541af3f081768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") 03:38:48 executing program 1: keyctl$setperm(0x14, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)) keyctl$set_reqkey_keyring(0x5, 0x0) pipe(&(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000240)="42805da0aa878769ef69dc00d9ce200441ffff1833c423fbf07b030d0f38211ac4c19086fbd9f28f6744adc90feefa4e2179fb237532c6c62e6736660f2d83000000000d64ac1e5da358b706b79866f046fe4ee57f") fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000000c0)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@loopback, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b00)={@loopback}, &(0x7f0000000b40)=0x14) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000c40)=@can, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000ec0)=""/88, 0x58}, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000f80)=@xdp, &(0x7f0000001000)=0x80, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000003400)={&(0x7f0000001040)=@can, 0x80, &(0x7f0000003340), 0x0, &(0x7f00000033c0)=""/20, 0x14}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000003440)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003480)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000034c0)={{{@in=@local, @in6=@loopback}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000035c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003600)={{{@in, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000003700)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003740)={0x0, @dev, @multicast2}, &(0x7f0000003780)=0xc) 03:38:48 executing program 4: futex(&(0x7f0000000040), 0x6, 0x0, &(0x7f00000001c0), &(0x7f0000000200), 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@ipx, &(0x7f0000000340)=0x80) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000a80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000580)="428055a047f2083897699990693d3dd9868441ff0f1837373addc422d50b20c1906986fbd9f29f66410b850f0000007ac7f2f2217c291a0feefac4e14b2a492d5224f04008346d0000000000753241801b0042afa03333420f709427771a69a500e306476bff745c1e1f7f") ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000240)) 03:38:49 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) accept$inet6(0xffffffffffffff9c, &(0x7f0000000380)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000480)=0x1c) openat$selinux_context(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/context\x00', 0x2, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000000640), &(0x7f00000006c0)=0x6e) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}, &(0x7f0000000280)=0x10) prctl$setmm(0x23, 0x0, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000002c0)="42805da0d10fef69dc0f01ee660f3a608600088041cb913591913d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1a3828c44379dfb9d6adbe90dfe2989f7f") 03:38:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x4000000000001b3, 0x0) 03:38:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x4000000000001b3, 0x0) 03:38:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x4000000000001b3, 0x0) 03:38:55 executing program 5: clock_nanosleep(0x2, 0x0, &(0x7f00000001c0), &(0x7f0000000280)) dup(0xffffffffffffff9c) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) memfd_create(&(0x7f0000000140)='/dev/keychord\x00', 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000180)='/dev/keychord\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000380)='/dev/keychord\x00', 0x0, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000200)={0x18}, 0x18) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in=@multicast2, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000001580)=0xe8) getegid() getpgid(0x0) getresuid(&(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640)) fstat(0xffffffffffffffff, &(0x7f0000001680)) gettid() geteuid() getegid() gettid() getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002bc0)) stat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)) fstat(0xffffffffffffffff, &(0x7f0000002cc0)) fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000002d40)) stat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002e80)) getresuid(&(0x7f0000002ec0), &(0x7f0000002f00), &(0x7f0000002f40)) getgid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002f80)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002fc0)={{{@in=@dev, @in=@broadcast}}}, &(0x7f00000030c0)=0xe8) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005640)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000005600)=':)md5sum.bdevvmnet1\x00'}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005680)={{{@in6=@ipv4={[], [], @remote}, @in6}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000005780)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000057c0), &(0x7f0000005800)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005840)={{{@in=@multicast1, @in=@dev}}, {{@in=@remote}}}, &(0x7f0000005940)=0xe8) getgroups(0x0, &(0x7f0000005980)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005dc0), &(0x7f0000005e00)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005e40), &(0x7f0000005e80)=0xc) getegid() syz_execute_func(&(0x7f0000000080)="428055a0ca6969ef69dc00d9036920375137c339392a8e0f38211a7c40a5a5a741dfe0c40265915cc57ee5e54175456426652e3e67a30080ffff1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:38:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x4000000000001b3, 0x0) 03:38:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x4000000000001b3, 0x0) 03:38:55 executing program 2: unshare(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syncfs(0xffffffffffffffff) sysinfo(&(0x7f00000003c0)=""/182) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000180)={{}, 'syz1\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000140)={'teql0\x00'}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000480)=ANY=[], 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000240)=""/254) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@multicast1, @in=@broadcast}}, {{@in=@remote}, 0x0, @in6=@dev}}, 0xe8) socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000001c0), 0xfa) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[]}}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f00), 0x400000000000308, 0x0, &(0x7f0000001000)={0x77359400}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) keyctl$session_to_parent(0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 03:38:55 executing program 3: socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000740), &(0x7f00000007c0)=0x4) openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000700), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'sit0\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480)={@multicast1, @remote}, &(0x7f0000000500)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in, @in=@dev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@dev, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000f00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000039c0)={{{@in=@local, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000003ac0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003b00)={{{@in6=@remote, @in=@local}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000003c00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003dc0)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000003ec0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003f00)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@mcast2}}, &(0x7f0000004000)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004140)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004180)={{{@in6, @in=@remote}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000004280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000042c0)={{{@in=@broadcast, @in=@local}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f00000043c0)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000048c0)={&(0x7f0000000300), 0xc, &(0x7f0000004880)={&(0x7f0000004400)={0x14}, 0x14}}, 0x0) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') set_robust_list(&(0x7f00000003c0)={&(0x7f0000000440)={&(0x7f0000000080)}, 0x0, &(0x7f0000000400)}, 0xff60) truncate(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$trusted_overlay_origin(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='trusted.overlay.origin\x00', &(0x7f0000000640)='y\x00', 0x2, 0x0) utime(&(0x7f0000000780)='./file0/file0\x00', &(0x7f0000000680)) socket(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575455f0f2e1a1a010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, &(0x7f0000000540)={&(0x7f0000000800)=ANY=[]}}, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0, 0x0) utime(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000180)) 03:38:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00008da000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000cd5000/0x4000)=nil) munlockall() 03:38:55 executing program 4: ppoll(&(0x7f0000000340), 0x0, &(0x7f0000000040)={0x77359400}, &(0x7f0000000040), 0x8) syz_open_procfs(0x0, &(0x7f0000000880)='attr/fscreate\x00') write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffceb}, 0x6) ustat(0x0, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c00)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) connect$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) getitimer(0x0, &(0x7f0000000280)) pipe(&(0x7f00000000c0)) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x0, 0xfffffffffffffff8) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000780)) keyctl$get_keyring_id(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000380), &(0x7f0000000700)) timer_delete(0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000740)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:38:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x4000000000001b3, 0x0) 03:38:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, &(0x7f0000000240)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff024}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000004500), 0x4000000000001b3, 0x0) 03:38:56 executing program 1: getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000340)='/dev/keychord\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000240)={0x0, @aes256}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000300)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f0000000380)}, 0x10) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000740)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400), 0x4) getpgrp(0xffffffffffffffff) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000002c0)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/enforce\x00', 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000440)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000780)=@abs, &(0x7f0000000800)=0x6e) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540), 0x0, 0x0, 0x0) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), &(0x7f0000000680)=0xc) keyctl$chown(0x4, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/load\x00', 0x2, 0x0) getpgid(0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000280)) syz_execute_func(&(0x7f00000006c0)="428055a0376969ef69dc3641ffaa32233333c4c2958e092e2edff228523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aa66daa50000000066430f55342d0a0000000f0da11b000000010d64ac1e5d31a314b706e2059cfffdfffd") ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) socket$nl_generic(0x10, 0x3, 0x10) clock_gettime(0x0, &(0x7f0000000880)) utimensat(0xffffffffffffffff, &(0x7f0000000840)='./file0\x00', &(0x7f00000008c0), 0x0) 03:38:56 executing program 4: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) openat$random(0xffffffffffffff9c, &(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000400)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='rdma.current\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000004c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000000c0)="42805da0c20f460f46dc0f01ee263a206e860000c0c176cbf3450f1a7f062900c4e1985f560c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e26f043108900000000450f2e628af5c4c4a1ff741c3f04d6adbe8adfe2c579987e") 03:38:57 executing program 1: setrlimit(0x0, &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000500), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000200)=ANY=[]) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000780)) getpid() write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000140)={0x2f, 0x37, 0x0, {0x0, 0x0, 0x0, 0x0, 0x11, 'vmnet1procselinux'}}, 0x2f) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="42805da01245cf0f01eece73fe470f006f92380f8ac469df1af3f081768cc8000601c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541f20f38f01a0f2e1ad6fb0703") 03:39:02 executing program 5: clock_gettime(0xffbffffffffffff8, &(0x7f0000000400)) pipe(&(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") memfd_create(&(0x7f0000000680)='}userloem0!,\x00', 0x0) syz_execute_func(&(0x7f0000000240)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:39:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)={0x2, 0x3, 0x0, 0x9, 0xe, 0x0, 0x1, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x70}}, 0x0) 03:39:02 executing program 1: ustat(0x1, &(0x7f0000000040)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f00000003c0)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211ac4c19086fbd9f28fc9c461d25d53a6c421301698000000004c42e145bd10167ea70075a70075fbc6f8fe237532c6c62e1a55010d64ac1e5da3c958b706b7989f7f") 03:39:03 executing program 2: getgroups(0x0, &(0x7f0000000180)) accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in=@dev}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@remote, @rand_addr}, 0xc) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffff9c) syz_execute_func(&(0x7f0000000200)="428055a0376969ef69dc3641fffaaa3203e53333c2c4e2859a5cda008e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 03:39:04 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ion\x00', 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000380), 0xfe70) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[], 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000580)) finit_module(0xffffffffffffffff, &(0x7f00000003c0)="73797374656d99656d31242ec600", 0x0) syz_emit_ethernet(0x0, &(0x7f0000000480)=ANY=[], &(0x7f0000000040)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe(&(0x7f00000004c0)) syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000018c0)=0x14) getpeername(0xffffffffffffffff, &(0x7f0000001900)=@can, &(0x7f0000001980)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000019c0)={{{@in=@dev, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000001ac0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001b40)=0x14) accept(0xffffffffffffffff, &(0x7f0000001b80)=@can, &(0x7f0000001c00)=0x80) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001c40)={0x0, @broadcast, @broadcast}, &(0x7f0000001c80)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001e80)={{{@in=@multicast2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001f80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002080)={'team0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005380)={@loopback}, &(0x7f00000053c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000005440)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005480)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000005580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005680)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000005780)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000057c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005800)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000005840)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000005940)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000059c0)={'eql\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005a00)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@loopback}}, &(0x7f0000005b00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005b40)={0x0, @loopback, @rand_addr}, &(0x7f0000005b80)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005bc0)={{{@in=@multicast2, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000005cc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006480)={&(0x7f0000000500), 0xc, &(0x7f0000006440)={&(0x7f0000005d00)={0x14}, 0x14}}, 0x0) pipe(&(0x7f0000000640)) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000680)={{{@in=@remote, @in6=@dev}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010bc0)={{{@in6=@local, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000440)=0x17c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d00)={0x0, @dev, @broadcast}, &(0x7f0000010d40)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010d80)={0x0, @rand_addr, @dev}, &(0x7f0000010dc0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000010f80)={&(0x7f00000002c0), 0xc, &(0x7f0000010f40)={&(0x7f0000010e00)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00'}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), 0x4) syz_execute_func(&(0x7f0000000380)="42805da0c70f854f26000073fe19fa400f1822420fc70b1af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179467aa2e541440f815d9d00000f2efb1a1a010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000200), 0x4) 03:39:04 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000380)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000001340)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001380)={{{@in, @in6=@ipv4={[], [], @loopback}}}, {{@in6}}}, &(0x7f0000001480)=0xe8) eventfd2(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f00000001c0)='pids.current\x00'}, 0x30) sched_setscheduler(0x0, 0x0, &(0x7f0000000340)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), &(0x7f0000000500)=0xfffffffffffffec9) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='pids.current\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000680)) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f00000005c0)={0x18}, 0x18) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) tkill(0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000240)="42805da0215151ef69dc0f01ee0dce41cbff9191a33d062900e89c0000003d233d23410f7bfaf3460fd6de660f653ee5e53e64420f131e0f2e1a1a010d64ac1e5dc482fd237900dfb9d6adbe90dfe2989f7f") ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000200)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000180)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000580), 0x4) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)=ANY=[], 0x0, 0x0, &(0x7f0000000500)}) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000006c0)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000480)) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0) 03:39:04 executing program 1: mremap(&(0x7f0000ff5000/0x4000)=nil, 0xb000, 0x10000, 0x0, &(0x7f0000fec000/0x10000)=nil) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0)='nbd\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='fd/3\x00') getpeername(0xffffffffffffffff, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000380)=0x80) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240), 0xc, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[]}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a0aa878769ef9e69dcdcd9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291ac4a1ab58f5c4c21d9e1f64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") finit_module(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0) syz_execute_func(&(0x7f0000000540)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") 03:39:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)={0x2, 0x3, 0x0, 0x9, 0xe, 0x0, 0x1, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x70}}, 0x0) 03:39:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)={0x2, 0x3, 0x0, 0x9, 0xe, 0x0, 0x1, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x70}}, 0x0) 03:39:04 executing program 1: keyctl$set_reqkey_keyring(0x4, 0xfffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000001c0), &(0x7f0000000080), 0x0, 0xfffffffffffffffb) keyctl$update(0x2, 0x0, &(0x7f00000002c0), 0x0) poll(&(0x7f0000000140), 0x0, 0x0) pipe(&(0x7f00000000c0)) getdents64(0xffffffffffffffff, &(0x7f0000000140)=""/92, 0x1d3) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000600)) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)=""/250, &(0x7f0000000300)=0xfa) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000740), 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) futimesat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000240)={{0x0, 0x2710}, {0x0, 0x2710}}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000280), 0x4) geteuid() ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000200)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6, @in=@dev}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000780)) clock_gettime(0x0, &(0x7f0000000680)) clock_gettime(0x0, &(0x7f00000006c0)) futimesat(0xffffffffffffffff, &(0x7f0000000640)='./file0\x00', &(0x7f0000000700)) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 03:39:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000140)) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)={0x2, 0x3, 0x0, 0x9, 0xe, 0x0, 0x1, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1}}]}, 0x70}}, 0x0) 03:39:04 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), &(0x7f00000001c0)={&(0x7f0000000100), 0x8}) socket(0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) readlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)=""/64, 0x40) clock_getres(0x0, &(0x7f0000000880)) fstat(0xffffffffffffffff, &(0x7f0000000280)) getegid() signalfd(0xffffffffffffff9c, &(0x7f0000000140), 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:39:08 executing program 5: futex(&(0x7f0000000440), 0x1, 0x0, &(0x7f00000004c0)={0x0, 0x989680}, &(0x7f0000000500), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:39:08 executing program 4: futex(&(0x7f0000000040), 0x5, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) clock_gettime(0x0, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f00000001c0)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)) syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$input_event(0xffffffffffffffff, &(0x7f00000002c0)={{0x77359400}}, 0x18) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040), 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0595c3300dcececb9fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a10dfbd6fee60f2e2121010d64ac1e5d31a3b7e2989d") ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000007c0)) getresuid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) stat(&(0x7f00000008c0)='./bus\x00', &(0x7f0000000900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000a00), &(0x7f0000000a40)=0xc) getgid() getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000000d40)) fstat(0xffffffffffffffff, &(0x7f0000000dc0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003880)) geteuid() getgroups(0x0, &(0x7f00000038c0)) 03:39:08 executing program 1: sync() eventfd2(0x0, 0x0) epoll_create1(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) lchown(&(0x7f00000005c0)='.\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000640)) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) ioprio_set$uid(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a032b6b6a20838386830d30000ff0f183736e33addc422d5f2a68f097002cc9f66410b850f0000006205c7c7f2217c291a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267386bff6767f340a4212dfca50000262666430ffb348b1f7f") accept4(0xffffffffffffffff, &(0x7f0000000500)=@un=@abs, &(0x7f0000000580)=0x80, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240)={@mcast1}, &(0x7f0000000440)=0x14) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L+', 0xe47}, 0x28, 0x0) syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:39:08 executing program 2: get_robust_list(0x0, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f00000000c0), 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f00000004c0)=0x18) setrlimit(0x0, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xf, &(0x7f00000002c0)='eth1ppp0[nodev\x00'}, 0x30) getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000340)) getpgrp(0x0) futex(&(0x7f0000000140), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000240), 0x0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)) ioprio_set$pid(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='setgroups\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0a10fef69dc0f01eeaf6c41ff0f66410f3840e934030f38211a67430f4bc5c19086d9f28fc9410feefa6b20784175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) syz_open_procfs(0x0, &(0x7f0000000680)='attr/sockcreate\x00') dup(0xffffffffffffffff) creat(&(0x7f0000000a80)='./file0\x00', 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/avc/cache_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@dev, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f00000007c0)=0xe8) 03:39:12 executing program 3: getitimer(0x0, &(0x7f0000000240)) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000080)={0x28}, 0x28) uname(&(0x7f0000000b00)=""/200) seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000740)="428055a0aa878769ef69dc00d9ce8441ff0f18370f38211a360fc2694d52df9086fbd9f28f27c461d25d53a6c421301698000000004c42e145bd10167ea70075a7a0002375fb44ddefc6c62e1a55010d64ac1e5d") 03:39:12 executing program 1: vmsplice(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000540)="42805da0cb0fef69dc0f01eef20f5ea10008804173fe19fa380f38211af7f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000cac4827d0f0364410f57dec4817a11910000010075450f2e1ac4010d64ac1e5d31a3b744dbe271fbc4c1d9fb61e9") 03:39:12 executing program 0: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) dup(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000d00)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000d80)='\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000f80)='memory.swap.current\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, 0xffffffffffffffff, 0x0, 0x386, &(0x7f0000000580)='@$\x00'}, 0xfffffffffffffeeb) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000bc0), &(0x7f0000000c80)=0xc) getpgid(0xffffffffffffffff) getpgid(0x0) capget(&(0x7f0000000040), &(0x7f0000000b80)) keyctl$set_reqkey_keyring(0x7, 0x0) memfd_create(&(0x7f00000004c0)='\x00', 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) memfd_create(&(0x7f0000000080)='vboxnet0}\x00', 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380)={@broadcast, @local, @broadcast}, 0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") socket$inet_udplite(0x2, 0x2, 0x88) renameat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000540)='./file0\x00') ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000340), 0x0, 0x0, 0xfffffffffffffff9) request_key(&(0x7f00000003c0)='.dead\x00', &(0x7f0000000400), &(0x7f0000000440)='vmnet1\'bdevem0.vboxnet0mime_typesecurity^\\keyring#nodevselinuxwlan0GPLGPL\x00', 0xfffffffffffffffc) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x2c) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000640)=""/194) signalfd(0xffffffffffffffff, &(0x7f0000000c40), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000005c0)) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@ipv4={[], [], @multicast1}, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000008c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000900)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000a40)={'ip6gre0\x00', @ifru_addrs=@hci}) recvmmsg(0xffffffffffffffff, &(0x7f0000008e40), 0x0, 0x0, 0x0) 03:39:12 executing program 4: getrandom(&(0x7f0000000200)=""/148, 0x3, 0x0) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000002c0)={'bridge0\x00', {0x2, 0x0, @multicast2}}) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0), 0x4) clock_gettime(0x0, &(0x7f00000003c0)) syz_open_pts(0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000340)}}, &(0x7f0000000400)) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000440)=""/232, &(0x7f0000000040)=0xe8) keyctl$set_reqkey_keyring(0x7, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) fcntl$getown(0xffffffffffffffff, 0x9) syz_execute_func(&(0x7f0000000580)="428055a0766969ef69dc00d99066418955a4e088d557207c2a06c46129ef950000002140a564a70d157a9e400f01efe5e5417545c4e37d6d5200002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f7e") 03:39:13 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d06295b00000f78993d233d23410feefa633917d1c423617dfe00bae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f7f") socket$packet(0x11, 0x0, 0x300) accept4(0xffffffffffffffff, &(0x7f0000000180)=@xdp, &(0x7f00000000c0)=0x80, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @dev, @rand_addr}, 0xc) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[]}}, 0x0) pipe(&(0x7f0000000040)) 03:39:13 executing program 1: request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:39:14 executing program 4: mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) prctl$setptracer(0x59616d61, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000540)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000700)) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000004c0)=""/77, 0x4d, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000400)={@local}, &(0x7f00000005c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)={@remote, @multicast2}, &(0x7f0000000700)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000a00)={{{@in=@multicast2, @in6=@mcast1}}, {{@in6=@loopback}, 0x0, @in=@rand_addr}}, &(0x7f0000000b00)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c40)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000c80)={@multicast2, @multicast1}, &(0x7f0000000cc0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000d00)={'team0\x00'}) accept4$packet(0xffffffffffffff9c, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f40)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000f80)={0x0, @multicast2, @local}, &(0x7f0000000fc0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001000)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000001100)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001140)={@loopback}, &(0x7f0000001180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000011c0)={{{@in6=@dev, @in=@local}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000012c0)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000002500)={&(0x7f0000001300)=@hci, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000002540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002580)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002700)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002780)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000002900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002940)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000029c0)=0x14) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") 03:39:14 executing program 1: clock_adjtime(0x0, &(0x7f0000000280)={0xfffffffffffffeff}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000680)={{{@in=@loopback, @in6=@mcast2}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000780)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000040)={'sit0\x00', {0x2, 0x0, @remote}}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000007c0)={@mcast2}, 0x14) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, 0x6e) dup(0xffffffffffffffff) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="42568055a07b7ac5818a818a8adc00d990c841ff0f1837d9cb0f38d4c4022d9b65fe81a8b32800d6352178e1e5e5c6c622c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000240)) keyctl$set_reqkey_keyring(0x4, 0x0) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") 03:39:16 executing program 5: getpgrp(0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000500)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000600)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000140)='vlan0\x00') sysinfo(&(0x7f00000005c0)=""/19) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a341cbff9191a33d065e0028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000006c0)={0x0, @multicast2, @broadcast}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@remote, @in6=@dev}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000940)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000980)={'bond_slave_0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@mcast2, @in=@remote}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000b40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000e40)={@remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000010c0)={@rand_addr, @multicast1}, &(0x7f0000001100)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001240)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001280), &(0x7f00000012c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001300)={{{@in6=@loopback, @in=@local}}, {{@in=@multicast2}}}, &(0x7f0000001400)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000580), 0xc, &(0x7f0000001900)={&(0x7f0000000b80)=ANY=[]}}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000540)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) request_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f0000000280), &(0x7f00000002c0)='[[mime_type$nodev\x00', 0xfffffffffffffffd) getpid() accept4$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f00000003c0), 0x4) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000004c0)) getresgid(&(0x7f0000000180), &(0x7f0000000340), &(0x7f0000000380)) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:39:16 executing program 1: signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) pwritev(0xffffffffffffffff, &(0x7f00000007c0), 0x0, 0x0) mlock2(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-$\x00', 0xffffffffffffff9c}, 0x10) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f0000000140)={0x14}, 0xfffffffffffffe9a) munmap(&(0x7f0000005000/0x3000)=nil, 0x3000) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'U+'}, 0x28, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000009c0)) stat(&(0x7f0000000a00)='./bus\x00', &(0x7f0000000a40)) stat(&(0x7f0000000ac0)='./bus\x00', &(0x7f0000000b00)) gettid() getresuid(&(0x7f0000000e40), &(0x7f0000000e80), &(0x7f0000000ec0)) getgroups(0x0, &(0x7f0000000f00)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000f40)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@dev, @in6=@mcast1}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getpgid(0xffffffffffffffff) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) getpgrp(0xffffffffffffffff) getuid() stat(&(0x7f0000001500)='./bus\x00', &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000015c0), &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./bus\x00', &(0x7f0000001680)) getgid() getuid() fstat(0xffffffffffffffff, &(0x7f0000001740)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000017c0)) getuid() lstat(&(0x7f0000001800)='./bus\x00', &(0x7f0000001840)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001b00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001b40), &(0x7f0000001b80)=0xc) stat(&(0x7f0000001bc0)='./bus\x00', &(0x7f0000001c00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c80), &(0x7f0000001cc0)=0xc) getresuid(&(0x7f0000001d00), &(0x7f0000001d40), &(0x7f0000001d80)) lstat(&(0x7f0000001dc0)='./bus\x00', &(0x7f0000001e00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000001e80)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001ec0)={{{@in6=@dev, @in=@dev}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000001fc0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000), &(0x7f0000002040)=0xc) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a09d878769ef69dc00d9ce41ff0f1837b90f38211ac4c19086d9f28fc94e2179fb4175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:39:16 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:16 executing program 0: mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f00000000c0)) syz_execute_func(&(0x7f00000008c0)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f7899c4e2192cbfc0e694187beefafa2179660f38302f4175450f2e1a400fbcc1c44379dfb9d6adbe90df470ff985feefffff9f3f") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000b40)=0xfffffffffffffd04) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in=@dev}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@multicast1, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a40)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000bc0)={{{@in6=@ipv4={[], [], @loopback}}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000d40)={{{@in6, @in=@remote}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000e40)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000000e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000ec0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a580)={{{@in6=@mcast1, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f000000a680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000a6c0)={{{@in=@multicast1}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f000000a7c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000a800)={{{@in6=@local, @in6=@ipv4={[], [], @local}}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f000000a900)=0xe8) accept(0xffffffffffffffff, &(0x7f000000a940)=@xdp, &(0x7f000000a9c0)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f000000aa00)={@rand_addr, @broadcast}, &(0x7f000000aa40)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f000000bb00), 0x0, 0x0, &(0x7f000000bc00)={0x0, 0x989680}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f000000bc40)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f000000bd40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000000bec0)={0x0, @empty, @dev}, &(0x7f000000bf00)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f000000bf40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000bf80)=0x14) 03:39:17 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:17 executing program 2: unshare(0x20000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000012ac0)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000106c0)) getitimer(0x0, &(0x7f0000000240)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000140)=""/195, &(0x7f00000002c0)=0xc3) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000300), &(0x7f0000000040)=0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000800)="42805da0bd0fef69dc0f01eece6dfa19fa380f38218f8978972bf0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac46279db67444472e671fb0703") signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000001c0)) eventfd2(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000006c0)={{{@in=@multicast1}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000880)={{{@in6, @in=@loopback}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000980)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@broadcast, @in=@loopback}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000c80)={'bpq0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@multicast2, @in=@local}}, {{}, 0x0, @in=@multicast2}}, &(0x7f0000000dc0)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000ec0)={{{@in6=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000fc0)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f0000003180)={@dev}, &(0x7f00000031c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000032c0)={{{@in=@multicast2, @in=@local}}, {{@in=@local}}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003540)={{{@in6=@ipv4={[], [], @remote}, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000003640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003680)={'team0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000036c0)={'bcsf0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000003700)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003780)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000037c0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003800)={'bridge_slave_1\x00'}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003840)={0x0, @dev, @dev}, &(0x7f0000003880)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000003900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003940)=0x14, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000003980)={@mcast1}, &(0x7f00000039c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003b40)={{{@in, @in6=@mcast1}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003c40)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000003cc0)={0x0, @local, @local}, &(0x7f0000003d00)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003d40)={{{@in=@remote, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000003e40)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000003e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000003ec0)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000004000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004040)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000004080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000040c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004100)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004180)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000004e40)={&(0x7f0000000b80), 0xc, &(0x7f0000004e00)={&(0x7f0000001000)=ANY=[]}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) fcntl$getflags(0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000540)=""/194) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000280)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)) getresuid(&(0x7f0000000500), &(0x7f0000000640), &(0x7f0000000680)) 03:39:17 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:17 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:17 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:17 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:18 executing program 1: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:18 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:21 executing program 5: uname(&(0x7f0000000300)=""/76) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000500)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[]}}, 0x0) socket$unix(0x1, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000900)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000980)=0xffffffffffffff9c, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000680)=""/66, &(0x7f0000000280)=0x42) getsockname$netlink(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000540)=0xc) getpgid(0x0) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)) getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000700)='system.posix_acl_access\x00', &(0x7f00000008c0), 0x24, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") unshare(0x0) sched_getscheduler(0x0) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000580)=ANY=[], &(0x7f00000002c0)='\x00', 0x1, 0x0) getpid() epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000440)) 03:39:21 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:21 executing program 4: write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x4, 0x4}], 0x18) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000140)}) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 03:39:22 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:22 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:22 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:22 executing program 4: write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x4, 0x4}], 0x18) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000140)}) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 03:39:22 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:22 executing program 4: write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x4, 0x4}], 0x18) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000140)}) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 03:39:23 executing program 4: write$evdev(0xffffffffffffffff, &(0x7f0000000100)=[{{0x77359400}, 0x4, 0x4}], 0x18) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000140)}) write$evdev(r0, &(0x7f0000000040)=[{}, {}], 0x52a) 03:39:23 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:23 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:29 executing program 5: unshare(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000000c0)='eth0wlan0nodeveth0systemuser\\(\'\x00'}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)) getpgid(0xffffffffffffffff) setpriority(0x0, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[], 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000240)) io_setup(0x0, &(0x7f00000002c0)) creat(&(0x7f0000000200)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$fou(&(0x7f0000000500)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000480), 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@FOU_ATTR_IPPROTO={0x8}]}, 0x1c}}, 0x0) io_cancel(0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000300)}, &(0x7f0000000440)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0690fef69dc6a6a01eece41ff0f183737c4c19086d9f28fc9410feefa6b2179f3acc4417c10fb410fdd300f2e1a0f1808e29866450ff61f7f") socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000600)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 03:39:29 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:29 executing program 3: perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)={@broadcast, @broadcast}, &(0x7f0000000600)=0xc) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f00000002c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000640)="1673115149f8259d7d69d50679d8fb2b06b197a7511e", 0x16, 0x80, &(0x7f0000000680)={0xa, 0x0, 0x67, @dev, 0x800}, 0x1c) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)="131377c5fc35d41454d5d41d29ad1a6029598146e6be166e41ad0dbd4054033c9f33bbda8224a2f3d772e7636e48b33cbf708372e8f1b9933ec5127743be2206209ef02df9cbf2f6e880d3382f00", &(0x7f0000000040)='./file0\x00') 03:39:29 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:29 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:29 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:29 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:29 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x7, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 03:39:29 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x7, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 03:39:30 executing program 4: utimes(&(0x7f0000000640)='./file0\x00', &(0x7f00000006c0)={{0x77359400}}) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000140), 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f0000000200), &(0x7f0000000240)='\x00', 0x0) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000280), &(0x7f0000000680)='trusted.overlay.opaque\x00', 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000010c0)={0x77359400}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@local, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in=@local, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) setresuid(0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002940), 0x0, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) timer_create(0x0, &(0x7f0000cd0000), &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) gettid() tkill(0x0, 0x0) syz_execute_func(&(0x7f0000000540)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) socket(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001780)) creat(&(0x7f0000000500)='./file1\x00', 0x0) perf_event_open$cgroup(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000017c0)={{{@in6=@remote, @in6=@local}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f00000018c0)=0xe8) stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)) getpgrp(0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 03:39:30 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x7, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 03:39:30 executing program 4: timer_create(0x0, &(0x7f0000000140)={0x0, 0x3, 0x0, @thr={&(0x7f00000007c0), &(0x7f0000000080)}}, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f0000000980)) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000280)) accept(0xffffffffffffffff, &(0x7f0000000480)=@alg, &(0x7f0000000240)=0x80) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000380), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[]}}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f00000007c0)) getgroups(0x0, &(0x7f0000000840)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d00)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001cc0)='\x00', 0xffffffffffffffff}, 0x30) lstat(&(0x7f0000001d40)='./file0\x00', &(0x7f0000001d80)) getresgid(&(0x7f0000001e00), &(0x7f0000001e40), &(0x7f0000001e80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002100)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002140)={{{@in=@multicast2, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000002240)=0xe8) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003f80), &(0x7f0000003f40)=0xc) getresuid(&(0x7f00000029c0), &(0x7f0000002a00), &(0x7f0000002a40)) fstat(0xffffffffffffffff, &(0x7f0000002a80)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000500)) lstat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)) getgroups(0x0, &(0x7f0000002c00)) fcntl$getown(0xffffffffffffffff, 0x9) geteuid() lstat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000003540)='./file0\x00', &(0x7f0000003580)) lstat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) getresuid(&(0x7f0000003a80), &(0x7f0000003ac0), &(0x7f0000003b00)) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003b40)) stat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)) fstat(0xffffffffffffffff, &(0x7f0000003c40)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003d80), 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)) fchmod(0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:39:35 executing program 5: creat(&(0x7f0000000200)='./file0\x00', 0x0) pipe2(&(0x7f0000000680), 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0xffffffffffffffff}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000500), 0x2c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000180)) clock_getres(0x0, &(0x7f00000001c0)) ustat(0x0, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) sched_getparam(0x0, &(0x7f00000002c0)) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000300), 0x4) getpgid(0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000000100)) syncfs(0xffffffffffffffff) geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@multicast1, @in6}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000640)=0xfffffffffffffdfd) clock_gettime(0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000180)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000080)={0x18}, 0x18) getgroups(0x0, &(0x7f00000000c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@remote, @in=@loopback}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000700)=ANY=[], 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000600)) setfsgid(0x0) futex(&(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000580), &(0x7f00000005c0), 0x0) 03:39:35 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f0000000140)='9', 0x1, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000000)=0x7, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000000c0)) 03:39:35 executing program 4: getuid() socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000007c0)) epoll_create(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)='wlan1\x00'}, 0x30) getpgid(0x0) timer_create(0x0, &(0x7f00000001c0), &(0x7f0000000280)) timer_getoverrun(0x0) readlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000140)=""/110, 0xff5f) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) getpid() ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x125f, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000080)="42805da0cd0fef69dcce73fe19a9380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fb660ffafa44dbe271fb26f00fbb9500000000") ioprio_get$pid(0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000340)) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000400)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:39:35 executing program 3: futex(&(0x7f0000000040), 0xc, 0x1, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") socket$netlink(0x10, 0x3, 0x0) dup(0xffffffffffffffff) mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:39:35 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:36 executing program 2: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000001300)=ANY=[@ANYBLOB="0100038566e4466da49f2560ed"], 0xd) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e20, 0x3, @remote, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0x0) 03:39:36 executing program 4: keyctl$set_reqkey_keyring(0xf, 0xff7ffffffffffffc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f00000005c0)={0x10}, 0x10) dup(0xffffffffffffffff) set_thread_area(&(0x7f0000000180)) mlockall(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) request_key(&(0x7f0000000680)='id_resolver\x00', &(0x7f00000006c0), &(0x7f0000000700)='security\x00', 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) set_thread_area(&(0x7f0000000040)) 03:39:36 executing program 1: clock_nanosleep(0xffc99a38, 0x0, &(0x7f00000004c0), &(0x7f0000000500)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) mincore(&(0x7f0000ffc000/0x1000)=nil, 0x1000, &(0x7f0000000440)=""/165) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, &(0x7f0000000040)=']{\x00', 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000600)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) accept(0xffffffffffffffff, &(0x7f0000000740)=@ax25, &(0x7f00000000c0)=0x80) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000340)) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000800)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000007c0)) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000380)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000600)}) connect$unix(0xffffffffffffffff, &(0x7f0000000640)=@file={0x0, './file0\x00'}, 0x6e) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getpgrp(0x0) setpriority(0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000280)) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @remote}, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/checkreqprot\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000700)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getpgrp(0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000003c0)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e298c422ed7992749f55") 03:39:37 executing program 1: uname(&(0x7f0000000880)=""/76) creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000280)) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000540)=""/208) syz_genetlink_get_family_id$team(&(0x7f0000000e80)='team\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000640)={@loopback}, &(0x7f0000000680)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000980), &(0x7f00000009c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@dev, @in=@multicast1}}, {{@in=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f0000000b00)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000b80)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000bc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000c00)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680)={0x0, @rand_addr, @broadcast}, &(0x7f00000016c0)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'lo\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001880)={@local}, &(0x7f00000018c0)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000001900), &(0x7f0000001940)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000001980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000019c0)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001a80)={0x0, @local, @local}, &(0x7f0000001ac0)=0xc) getpeername$packet(0xffffffffffffffff, &(0x7f0000001b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001b40)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004580)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000004680)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000046c0)={@mcast1}, &(0x7f0000004700)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004740), &(0x7f0000004780)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000047c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004840)={0x0, @dev, @multicast1}, &(0x7f0000004880)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000048c0)={@local}, &(0x7f0000004900)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000004b00), &(0x7f0000004b40)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004b80), &(0x7f0000004bc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000004c00), &(0x7f0000004c40)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000c40)={{{@in6=@loopback, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000004e40)=0xffffffffffffff7d) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000004e80)={'team0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000005100), &(0x7f0000005140)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005180)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000005280)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@local, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000006c0)=0x110) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000005400)={@dev}, &(0x7f0000005440)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000005580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000055c0)=0x14, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005700)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005740)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000005840)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005880)={{{@in=@loopback, @in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000005980)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000005a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005ac0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000005d40)={{{@in, @in=@remote}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000005e40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000006a00)={&(0x7f00000002c0), 0xc, &(0x7f00000069c0)={&(0x7f0000005e80)={0x14}, 0x14}}, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000500)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000380), 0x2ee, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[], 0xfffffffffffffe65}}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040), 0x0) socket$unix(0x1, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000140)=0x80, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe5}]}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000001100)) fstat(0xffffffffffffffff, &(0x7f0000001180)) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000001200)) fstat(0xffffffffffffffff, &(0x7f0000001700)) getgid() getgroups(0x0, &(0x7f0000001300)) getgroups(0x0, &(0x7f0000001340)) syz_execute_func(&(0x7f0000001d40)="428055a0866969ef69dc00d93e3e3e660f381ecaa71837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:39:37 executing program 4: ustat(0x3, &(0x7f0000000280)) geteuid() clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) time(&(0x7f0000000300)) syz_open_dev$rtc(&(0x7f00000004c0)='/dev/rtc#\x00', 0x0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getpgid(0x0) sched_rr_get_interval(0x0, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$netlink(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080), 0xc) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4), 0xc) dup(0xffffffffffffffff) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000080)) getpgid(0xffffffffffffffff) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000380)={{0x2, 0x0, @dev}, {0x0, @dev}, 0x0, {0x2, 0x0, @multicast1}, 'team0\x00'}) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00') syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') syz_execute_func(&(0x7f0000000140)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:39:37 executing program 1: unshare(0x0) pipe(&(0x7f0000000140)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000240)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) inotify_init() sigaltstack(&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040)) creat(&(0x7f0000000180)='./file0\x00', 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000340)=""/165) fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) fstat(0xffffffffffffffff, &(0x7f0000000980)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in6=@dev, @in6=@remote}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000b00)=0xe8) getresgid(&(0x7f0000000b40), &(0x7f0000000b80), &(0x7f0000000bc0)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c00)={{{@in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000d00)=0xe8) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e00)) geteuid() stat(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000e80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003940)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003980)={{{@in=@rand_addr, @in=@local}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000003a80)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) faccessat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000300)="428055a032b6b683a4ee6600000027ff0f183736e33a85ddd2d2d5f2a68f097002cc9f66410b850f0000006205c7c7f221c463cd6829f31a0feefac4e14b2a492d52c4e119fddd4008356d0000000000753241801b0042afa03333420f709427771a69a500e3c4c13b7c1267660f3a228700000000656767f340a4212dfca50000262666430ffb348b1f7f") 03:39:38 executing program 4: keyctl$set_reqkey_keyring(0x7, 0xfffffffc) clock_getres(0x0, &(0x7f00000002c0)) futex(&(0x7f0000000a00), 0x0, 0x2, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) memfd_create(&(0x7f0000000080)='[systemvboxnet1}%vboxnet1vboxnet1\\^^mime_type[,vmnet0\x00', 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000300)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000440)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @loopback}, @in6=@mcast2}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) 03:39:44 executing program 5: lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=@known='trusted.overlay.opaque\x00', &(0x7f0000000cc0)=""/4096, 0x1000) keyctl$set_reqkey_keyring(0x4, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) set_robust_list(&(0x7f0000000680)={&(0x7f00000005c0)={&(0x7f0000000580)}, 0x0, &(0x7f0000000640)={&(0x7f0000000600)}}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001d80)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000280)="42805da0d10fef69dc0f01ee660f3a608600088041cb35919149060e0a00000ff38323980feefa6b21798f4810866a00debae5e5e575450f2e1a3828c4220d39cba20fc77112c4633d5d8e030000004b7f") 03:39:44 executing program 1: getpriority(0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000500)='./file0\x00') seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000080)=0xfffffffffffffdf6) eventfd(0x0) syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000140)) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001600)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$loop(0xfffffffffffffffe, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000004c0)=""/4096) getresuid(&(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000240)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f00000001c0)=0xc) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000001640)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000300)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000014c0)=0x14) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001500)={{{@in=@remote, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, 0xe8) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") seccomp(0x0, 0x0, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000740)="52805da0990fef69dc2e3e7b0fe48adf4b51ce51da6ff002ff380f38211af3f081a4768c23ca0000a08081b5b5470f624485cc2167f00fbab204000000ca63ae79dae5e5c461d95969f145450f71f5fbc4010d64ac1e5d31a3b744cc230fd99e0c000000e14ba5") 03:39:44 executing program 3: futex(&(0x7f0000000080), 0x6, 0x0, &(0x7f0000000380)={0x77359400}, &(0x7f0000000300), 0x0) clock_getres(0x0, &(0x7f00000002c0)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x1ff) futex(&(0x7f0000000a00), 0x0, 0x1, &(0x7f0000000540)={0x77359400}, &(0x7f00000007c0), 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.current\x00', 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000240)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'ovf\x00'}, 0x2c) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000009c0)) geteuid() getgroups(0x0, &(0x7f0000000bc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000c00)) getuid() getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000f00)) stat(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001000), &(0x7f0000001040)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001080)) lstat(&(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)) getgid() gettid() stat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) getpid() lstat(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)) getgroups(0x0, &(0x7f00000026c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d40), &(0x7f0000002d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002dc0), &(0x7f0000002e00)=0xc) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1f, &(0x7f0000002e40)="736563757269747920d1277b656d306d643573756d76626f786e6574305d00", 0xffffffffffffffff}, 0x30) getuid() getresgid(&(0x7f0000002ec0), &(0x7f0000002f00), &(0x7f0000002f40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004380)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000004340)='ovf\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000043c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000044c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000004500)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000dc0)) getresuid(&(0x7f00000045c0), &(0x7f0000004600), &(0x7f0000004640)) getegid() getpgid(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005c80)={{{@in6=@mcast1, @in=@local}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000005d80)=0xe8) lstat(&(0x7f0000005dc0)='./file1\x00', &(0x7f0000005e00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005e80), &(0x7f0000005ec0)=0xc) geteuid() getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000006200)) geteuid() lstat(&(0x7f0000006240)='./file0\x00', &(0x7f0000006280)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000006300)) getgroups(0x0, &(0x7f0000006380)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006440), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40), &(0x7f0000000b80)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'bond_slave_0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast1}}, {{}, 0x0, @in6=@ipv4}}, &(0x7f0000000500)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@remote, @in6=@dev}}, {{@in=@remote}, 0x0, @in=@local}}, 0xe8) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000300)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0)) 03:39:44 executing program 4: mmap(&(0x7f000090c000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000580)='./file1\x00', 0x0, 0x0) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f00000005c0)={0x20}, 0x20) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) request_key(&(0x7f0000000880)='keyring\x00', &(0x7f00000008c0), &(0x7f0000000900)='eth0-\x00', 0xfffffffffffffffd) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000340), 0x8) clock_adjtime(0x0, &(0x7f0000000240)) ppoll(&(0x7f0000000080), 0x97, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000040), 0x8) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) sync() ioprio_set$uid(0x0, 0x0, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000540)) pipe2(&(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001480)="428055a0c26969ef69dc00d9906920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01ee31a3b786e298262e6426f30f2b05090000003f") socket$inet_udplite(0x2, 0x2, 0x88) accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000140)) 03:39:44 executing program 0: add_key$keyring(&(0x7f0000001540)='keyring\x00', &(0x7f0000001580), 0x0, 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001600), 0x4) request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000240)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000015c0)) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000002c0)={'nat\x00'}, &(0x7f0000000000)=0x78) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0), &(0x7f0000000080)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700", 0xfffffffffffffffb) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:39:47 executing program 4: getrusage(0xfffffffffffffffd, &(0x7f0000000480)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000140)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b8c410febbd09000000800f2ed9c4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") getuid() dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x89, &(0x7f0000000240), &(0x7f0000000300)=""/137}, 0x28) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001980)) fstat(0xffffffffffffffff, &(0x7f00000019c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a40), &(0x7f0000001a80)=0xc) getresgid(&(0x7f0000001ac0), &(0x7f0000001b00), &(0x7f0000001b40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002100)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002140), &(0x7f0000002180)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000021c0)) getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) fstat(0xffffffffffffffff, &(0x7f0000002840)) getpgrp(0xffffffffffffffff) stat(&(0x7f0000004e00)='./file0\x00', &(0x7f0000004e40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004f00)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000004ec0)='vmnet1\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000004f40)) socket$inet6_udp(0xa, 0x2, 0x0) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000004fc0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000005040)) stat(&(0x7f0000005080)='./file0\x00', &(0x7f00000050c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000006780)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000006740)='lo.[\x00', 0xffffffffffffffff}, 0x30) getegid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000067c0)) getgid() gettid() getgroups(0x0, &(0x7f0000006b40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006b80)) fstat(0xffffffffffffffff, &(0x7f0000006bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006c40), &(0x7f0000006c80)=0xc) getgroups(0x0, &(0x7f0000006cc0)) getpgid(0x0) getresgid(&(0x7f00000074c0), &(0x7f0000007500), &(0x7f0000007540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007580), &(0x7f00000075c0)=0xc) stat(&(0x7f0000007600)='./file0\x00', &(0x7f0000007640)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000076c0)) lstat(&(0x7f0000007700)='./file0\x00', &(0x7f0000007740)) getpgrp(0x0) getgroups(0x0, &(0x7f00000077c0)) 03:39:47 executing program 1: times(&(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)) 03:39:47 executing program 2: clock_gettime(0x5, &(0x7f0000000200)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@remote, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000900)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000a00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000a40)={0x0, @dev, @remote}, &(0x7f0000000a80)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f00000024c0), 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002600)={{{@in=@remote, @in=@dev}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000002700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002740)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000002840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002880)={{{@in, @in=@loopback}}, {{@in=@dev}}}, &(0x7f0000002980)=0xe8) prctl$void(0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe0}]}) syz_execute_func(&(0x7f0000000580)="42805da0ad5252ef84dc3df83df8eece67f3406e660c54823dc3c381768cc80000000f00c367f00fbab204000000ca366442c18700000000265cca670f38020a0f2e1ac4010d64ac1e5d31a3b744dbe266440f2eb6f19ea5e30721") select(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) seccomp(0x0, 0x0, &(0x7f0000000100)) rt_sigpending(&(0x7f0000000380), 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) unlink(&(0x7f0000000480)='./file0\x00') ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000340)) 03:39:48 executing program 4: keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) keyctl$clear(0x7, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) memfd_create(&(0x7f0000000080)='/dev/full\x00', 0x0) getpgid(0x0) syz_open_procfs(0x0, &(0x7f00000012c0)='projid_map\x00') setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0), 0x4) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) lsetxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U+', 0x4b12}, 0xd1f99396d1a53b23, 0x0) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:48 executing program 1: select(0x40, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) listxattr(&(0x7f0000000480)='./file0\x00', &(0x7f0000000500)=""/93, 0x5d) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, &(0x7f0000000340)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f00000003c0)) syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@remote, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000840)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001bc0)={0x0, @local, @rand_addr}, &(0x7f0000001c00)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001c40)={@local, @loopback}, &(0x7f0000001c80)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001cc0), &(0x7f0000001d00)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000001d80), &(0x7f0000001dc0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002080)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000002180)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000022c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000023c0)={{{@in=@multicast1, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f00000024c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002500)={{{@in=@remote, @in=@dev}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000002600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002700)={{{@in6=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000002800)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000002840)=@hci, &(0x7f00000028c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a00)={{{@in=@multicast1, @in6}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000002b00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002b40)={{{@in=@local}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000002c40)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000002c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002cc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002e00)={{{@in=@local, @in=@rand_addr}}, {{}, 0x0, @in6}}, &(0x7f0000002f00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002f40)={@mcast1}, &(0x7f0000002f80)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f00000034c0)={&(0x7f0000000600), 0xc, &(0x7f0000003480)={&(0x7f0000002fc0)=ANY=[]}}, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) rmdir(&(0x7f0000000380)='./file0\x00') setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000580), 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000004c0), 0x4) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") accept4(0xffffffffffffffff, &(0x7f00000001c0)=@hci, &(0x7f0000000240)=0x80, 0x0) 03:39:49 executing program 4: futex(&(0x7f0000000040), 0x1, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:39:49 executing program 1: timerfd_create(0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="428055a0376969ef69dc3641ffaa32233333c4c2958e0941a30f7f7f3766460f3828523044c19086d962788f35c935c97d197a0779fbc463fd7998b400ba000079aaff47d2e1660f0da11b000000010d64ac1e5d31a314b706e205987b7f") dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$netlink(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0xc) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) request_key(&(0x7f0000000a00)='rxrpc\x00', &(0x7f0000000a40), &(0x7f0000000a80)='IPVS\x00', 0xfffffffffffffff9) add_key$user(&(0x7f00000009c0)='user\x00', &(0x7f0000000ac0), &(0x7f0000000800), 0x0, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f00000008c0)=""/205, 0xcd) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)) getgroups(0x0, &(0x7f0000000300)) clock_nanosleep(0x0, 0x0, &(0x7f00000005c0), &(0x7f0000000600)) syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000680), 0xc, &(0x7f0000000740)={&(0x7f0000000700)=ANY=[]}}, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000040)) write$selinux_create(0xffffffffffffffff, &(0x7f00000001c0)=@objname={'system_u:object_r:ping_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x0, 0x20, './file0\x00'}, 0x4d) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000080)=""/118) pread64(0xffffffffffffffff, &(0x7f0000000180)=""/61, 0xfffffff1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) time(&(0x7f0000000140)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000640)) lgetxattr(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)=ANY=[], &(0x7f00000003c0)=""/216, 0xd8) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000280)={0x0, @broadcast, 0x0, 0x0, 'sed\x00'}, 0x2c) 03:39:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_emit_ethernet(0x0, &(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) setgroups(0xf9, &(0x7f0000000040)) getgid() seccomp(0x8000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) epoll_create(0x0) syz_execute_func(&(0x7f00000002c0)="428055a0336969ef69dc364180c7e041a30f7f7f3766460f38285230c4637905a70d000000c135c935c97d197a0779fb8f2860ceeba679cbff43d0e1460f0da11b000000010d64ac1e5d31a314b706e242d08039c52a7d987b7f") openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) ptrace$peekuser(0x3, 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) 03:39:52 executing program 4: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) getpid() eventfd(0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f00000003c0)) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000440)) creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f00000001c0)={'ip_vti0\x00', @link_local}) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)='ip_vti0\x00'}, 0x30) fstat(0xffffffffffffffff, &(0x7f0000000580)) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000980)={{{@in6=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a80)={{{@in6, @in=@rand_addr}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'teql0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000d00)={@dev, @broadcast}, &(0x7f0000000d40)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000e80), &(0x7f0000000ec0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000001200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001240)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001280)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000001380)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001440)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002500)={{{@in, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000002600)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002900)={{{@in6=@local, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000002a00)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002ac0)={0x0, @dev, @multicast2}, &(0x7f0000002b00)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000002b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002b80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@dev, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000002cc0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002d00)={'veth0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002d40)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002d80)={{{@in, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000002e80)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002ec0)={@broadcast}, &(0x7f0000002f00)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002f40)={@local}, &(0x7f0000002f80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003080)={{{@in6=@ipv4={[], [], @remote}, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000003180)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f00000031c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003200)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000003240), &(0x7f0000003280)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000032c0)={{{@in=@local, @in=@multicast1}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f00000033c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in=@remote, @in6}}, {{@in=@broadcast}, 0x0, @in6=@dev}}, &(0x7f0000003500)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003540)={{{@in=@local, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000003640)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000003740), &(0x7f0000003780)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000037c0)={{{@in, @in=@broadcast}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000038c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000004e40), &(0x7f0000004e80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004ec0)={{{@in6=@remote, @in=@rand_addr}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000004fc0)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000005b40)={&(0x7f0000000000), 0xc, &(0x7f0000005b00)={&(0x7f0000005000)=ANY=[]}}, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000006c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@loopback, @in=@broadcast}}, {{@in=@dev}}}, &(0x7f0000000800)=0xe8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000c40)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") 03:39:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r2 = creat(&(0x7f0000000140)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x40000, 0xfff) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7}, 0x7) fallocate(r1, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) 03:39:52 executing program 3: dup(0xffffffffffffff9c) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000680)={'filter\x00'}, &(0x7f00000004c0)=0x78) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@ipv4={[], [], @rand_addr}, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000000300)=0xe8) bind$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000540)='syzkaller\x00', 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'team0\x00'}) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@loopback, @dev}, &(0x7f0000000200)=0xfffffff4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000bc0)={0x0, @dev, @multicast1}, &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000d40)={{{@in6=@mcast1, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in=@dev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000f80)=0x4ad) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in=@broadcast, @in6=@ipv4={[], [], @rand_addr}}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000001180)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000005c40), 0x0, 0x0, &(0x7f0000005e80)) sendto$inet(0xffffffffffffffff, &(0x7f00000011c0), 0x0, 0x0, &(0x7f0000000440)={0x2, 0x0, @local}, 0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast2, @in=@multicast2}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000005fc0)=0xe8) socket$unix(0x1, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000006500)={&(0x7f0000000140), 0xc, &(0x7f00000064c0)={&(0x7f0000000480)=ANY=[]}}, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000240), 0xa) 03:39:52 executing program 0: setpriority(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000200)) syz_emit_ethernet(0x0, &(0x7f00000006c0)=ANY=[], 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000580)=@nat={'nat\x00', 0x19, 0x1, 0x90, [0x20000a80, 0x0, 0x0, 0x20000ab0, 0x20000ae0], 0x0, &(0x7f0000000540), &(0x7f0000000a80)=[{}, {}, {}]}, 0x108) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={"67726530008000"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@remote, @in=@multicast1}}, {{}, 0x0, @in6=@remote}}, 0xe8) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000500)) getgid() ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000480)={@local}, 0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a00)="42805da06e0f460f46dc0f01ee263a2086008484c0c176cb66662626660f69b200000000290070e13a8ca50c0f0f99583d2350230606eaf30f53cf6b2179660f38302f3e268ff043108900000000000f2e628af5c4c4a1ff701c3f04670f6f33adbe90dfe2987e") setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000004c0), 0xc) socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @local}, 0x1c) 03:39:52 executing program 1: socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000004c0)) getpid() inotify_init() seccomp(0x0, 0x0, &(0x7f0000000100)={0x1fb, &(0x7f00000005c0)}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000480), 0x10) dup(0xffffffffffffffff) geteuid() setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000040)={0x0, @local, 0x0, 0x0, 'sh\x00'}, 0x2c) request_key(&(0x7f00000002c0)='rxrpc_s\x00', &(0x7f0000000300), &(0x7f0000000340)='GPLmime_type[posix_acl_access\x00', 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000400), &(0x7f0000000440)=0x10) fstat(0xffffffffffffffff, &(0x7f0000001dc0)) times(&(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast1}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000700)=0xfffffffffffffe44) stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000001f40)) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000140)={@mcast2}) lstat(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280), 0x0, 0x0, 0xfffffffffffffffa) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000380)) keyctl$unlink(0x9, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000003c0)={@loopback}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") 03:39:53 executing program 4: getxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.origin\x00', &(0x7f0000000340)=""/80, 0x50) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getegid() syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") memfd_create(&(0x7f0000000040)='keyring}%hGPLYposix_acl_accesssecuritybdevmime_type\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f00000002c0)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) 03:39:54 executing program 2: socket$inet6(0xa, 0x0, 0xb27) keyctl$set_reqkey_keyring(0x4, 0x0) timerfd_create(0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffffff, 0xffffffffffffffff) getpid() getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000003c0)={@loopback, @remote}, &(0x7f0000000480)=0xc) getpgid(0xffffffffffffffff) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000580), 0x4) syz_extract_tcp_res(&(0x7f00000005c0), 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000600), 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000640)={@dev, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "7cb822", 0x14, 0x0, 0x0, @dev, @dev, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000008c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000140)=0xe8) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffff8) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x9}, 0x28, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000500)={'nat\x00', 0x2, [{}, {}]}, 0x48) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f00000001c0)={0x7}, 0x7) write$cgroup_type(0xffffffffffffffff, &(0x7f00000004c0)='threaded\x00', 0x9) 03:39:54 executing program 1: setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000680)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000700)) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)={&(0x7f0000000300), 0x8}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) socketpair(0x0, 0x0, 0x0, &(0x7f0000000680)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)) getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f00000006c0)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:39:54 executing program 4: dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)) rt_sigpending(&(0x7f0000000040), 0x8) pipe2(&(0x7f0000000080), 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000480)={{}, 'syz0\x00'}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000540)='./file0\x00', 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) accept$packet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'team0\x00'}) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000180)='syz1\x00') syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec4813dd83019fac441a77c7077640f1a111af3c40223f7670000000081b5e5bc2b0000002167f00fbab204000000cac48205003bdae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:39:55 executing program 4: keyctl$join(0x1, &(0x7f0000000040)) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) pipe(&(0x7f0000000fc0)) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000180), 0x4) sched_rr_get_interval(0x0, &(0x7f0000000080)) ustat(0x0, &(0x7f0000000140)) seccomp(0x0, 0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) getpeername(0xffffffffffffff9c, &(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000540)=0x80) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000580)={'NETMAP\x00'}, &(0x7f00000005c0)=0x1e) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") memfd_create(&(0x7f0000000340)='wlan1\x00', 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000380)='threaded\x00', 0x9) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) ioctl$PIO_FONTX(0xffffffffffffffff, 0x4b6c, &(0x7f00000003c0)) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000680)={0x0, &(0x7f0000000640)}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000600), 0x0) clock_gettime(0x0, &(0x7f0000001000)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000006c0)=ANY=[], 0x0) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000180)) getpgid(0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f00000008c0)) fstat(0xffffffffffffffff, &(0x7f0000000900)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000980)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@broadcast, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000000ac0)=0xe8) getgid() fcntl$getown(0xffffffffffffffff, 0x9) fstat(0xffffffffffffffff, &(0x7f0000000b00)) getegid() getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@remote, @in=@dev}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000c80)=0xe8) getgid() getpgrp(0x0) getresuid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) stat(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e40)) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)) getegid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005cc0), 0x0, 0x0) 03:39:55 executing program 1: clock_gettime(0x0, &(0x7f0000000800)) add_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f00000005c0), 0x0, 0x0, 0xfffffffffffffffb) add_key(&(0x7f0000000340)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000540), 0x0, 0x0) request_key(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640), &(0x7f0000000680)='\x00', 0xfffffffffffffffd) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)) readv(0xffffffffffffffff, &(0x7f00000018c0), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000006c0)) chdir(&(0x7f0000000440)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300), &(0x7f0000000400)='rxrpc_s\x00', 0x0) syz_execute_func(&(0x7f00000004c0)="40805da08d0fef69dcc4a3bd79734c44cec48275ad7700f30faeda380fc4c27d0777051af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175451a010d64ac1e5d31a3b744dbe271fb0f4fb500088041") mknod$loop(&(0x7f0000000780)='./file1\x00', 0x0, 0xffffffffffffffff) seccomp(0x0, 0x0, &(0x7f0000001880)) ustat(0x0, &(0x7f0000000140)) getsockopt$IP_VS_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x481, &(0x7f0000005c40), &(0x7f0000001940)=0x3) fcntl$getflags(0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000580)) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000700)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f00000005c0)}}}) openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000980)='!\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000b00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000bc0)) getuid() fstat(0xffffffffffffffff, &(0x7f0000000c00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c80)) getuid() getgid() gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) lstat(&(0x7f0000001040)='./file1\x00', &(0x7f0000001080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001140)={&(0x7f0000001100)='keyring\x00'}, 0x10) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000002000)) stat(&(0x7f0000002080)='./file1\x00', &(0x7f00000020c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002300), &(0x7f0000002340)=0xc) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002380), &(0x7f00000023c0)=0xc) getpid() fstat(0xffffffffffffffff, &(0x7f0000002400)) stat(&(0x7f0000002480)='./file1\x00', &(0x7f00000024c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002540), &(0x7f0000002580)=0xc) getuid() stat(&(0x7f00000025c0)='./file0\x00', &(0x7f0000002600)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002680)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000026c0)={{{@in=@remote, @in6=@dev}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000027c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002800)) getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003b00)={{{@in=@loopback, @in6}}, {{@in6=@mcast1}}}, &(0x7f0000003c00)=0xe8) stat(&(0x7f0000003c40)='./file1\x00', &(0x7f0000003c80)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003d00)) lstat(&(0x7f0000003d40)='./file1/file0\x00', &(0x7f0000003d80)) getresgid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000003ec0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003f00)={{{@in=@broadcast, @in=@local}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@local}}, &(0x7f0000004000)=0xe8) lstat(&(0x7f0000004040)='./file2\x00', &(0x7f0000004080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004100)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004140)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000004240)=0xe8) 03:39:56 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) setresuid(r1, r1, 0x0) 03:39:56 executing program 4: clock_settime(0x0, &(0x7f00000001c0)) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001500)) geteuid() getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001840)) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001880), &(0x7f0000001340)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001940)=0x340) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001980)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f00000012c0), &(0x7f0000001300)=0x40) getgroups(0x0, &(0x7f0000001a00)) gettid() mkdirat(0xffffffffffffffff, &(0x7f0000001280)='./file0\x00', 0x0) lstat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000280)=""/4096) syz_execute_func(&(0x7f0000000200)="42805da0bd0fef69dc0f01eece49fe19fccdfcc40191158d00000080660f79f31af3040081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b7445ae6720703") setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001540)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 03:39:56 executing program 1: socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0), &(0x7f0000000140)="2c402f73656c696e75781447504c7070703000", 0xffffffffffffffff) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f00000002c0)={{0xa, 0x0, 0x0, @remote}, {0xa, 0x0, 0x0, @remote}}, 0x5c) pipe2(&(0x7f0000000100), 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'bcsf0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000540)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000700)=0x14) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @broadcast, @rand_addr}, &(0x7f0000000780)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000880)={{{@in=@rand_addr, @in6}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b80)=0x14, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@loopback, @in6=@loopback}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@multicast1, @in=@loopback}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000000e40)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000f80)={@multicast1, @loopback}, &(0x7f0000000fc0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001000)={{{@in6=@remote, @in6}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000001100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001140)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000001240)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001280)={{{@in=@multicast1, @in6=@remote}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000001380)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000013c0)={{{@in=@dev, @in6=@remote}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000014c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000015c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002ec0)={{{@in=@broadcast, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000002fc0)=0xb25c74f5) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003000)={{{@in6=@mcast2, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f0000003100)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000000400), 0xc, &(0x7f0000003700)={&(0x7f0000003140)={0x14}, 0x14}}, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000240)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @local}}, 0x5c) clock_gettime(0x0, &(0x7f0000000380)) write$input_event(0xffffffffffffffff, &(0x7f00000003c0), 0x18) getuid() seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$int_out(0xffffffffffffffff, 0x0, &(0x7f0000000340)) syz_execute_func(&(0x7f00000001c0)="42805da0120fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000240), 0x0, 0x8) add_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000480), &(0x7f0000000600), 0xf8, 0xfffffffffffffffc) 03:39:57 executing program 3: keyctl$session_to_parent(0x12) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) pipe2(&(0x7f0000000680), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="428055a08e6969ef69dc00d9900f98181837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f8fca08124ef400000000") 03:39:57 executing program 0: keyctl$set_reqkey_keyring(0xe, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0), &(0x7f0000000400)=0xc) getresgid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) getgroups(0x0, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x28, &(0x7f0000000080)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000440), 0xc) getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/77, 0x4d, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ppp\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(0xffffffffffffffff, 0x770a, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000800)) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000280), &(0x7f0000000940), 0x0, 0xfffffffffffffff9) keyctl$set_timeout(0xf, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000340)=0x1e) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000940)=ANY=[], 0x0) stat(&(0x7f0000000540)='./file1\x00', &(0x7f0000000b00)) lsetxattr$trusted_overlay_origin(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) keyctl$setperm(0x5, 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000008c0)) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000002c0)) unshare(0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff}, 0xfffffffffffffebd) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000880)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:39:57 executing program 4: clock_adjtime(0x0, &(0x7f0000000200)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0356969ef69dc3641ffaa32233333c4c2958e09c443e17836f72666460f1bfd44c19086d962788f1635c49d520a7d0ac97d79fb0fc7fd79aaff43d0e1460f0da11b000000010d64ac1e5d31a314b706e205987b7f") 03:39:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000240)=0x100000001) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffffffffffd}) 03:40:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0x14, &(0x7f00006ed000), &(0x7f0000000000)=0x2) 03:40:00 executing program 1: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000080)="428055a0690fef69dc00d9ce41fb0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:40:00 executing program 4: poll(&(0x7f0000000100), 0xcf, 0x0) keyctl$session_to_parent(0x12) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000480), 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000a00)='keyring\x00', &(0x7f00000002c0), 0x0, 0x0, 0x0) add_key(&(0x7f0000000840)='logon\x00', &(0x7f0000000880), &(0x7f0000000980), 0x0, 0x0) pipe2(&(0x7f0000000b40), 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000b00)='memory.max\x00', 0x2, 0x0) getpid() getuid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000008c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000900)={{{@in=@multicast2, @in6=@loopback}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000a40)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000cc0)) geteuid() getegid() getpgid(0xffffffffffffffff) getuid() getresgid(&(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000dc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e00)={{{@in6=@local, @in6=@dev}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000f00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000f40)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002580)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000002680)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000026c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002740)) fstat(0xffffffffffffffff, &(0x7f0000002780)) getgroups(0x0, &(0x7f0000002800)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002840), &(0x7f0000002880)=0xc) getresuid(&(0x7f00000028c0), &(0x7f0000002900), &(0x7f0000002940)) lstat(&(0x7f0000002980)='./file0\x00', &(0x7f00000029c0)) getpid() getuid() stat(&(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002f00)={{{@in6=@mcast1, @in=@local}}, {{@in6=@mcast2}, 0x0, @in=@loopback}}, &(0x7f0000003000)=0xe8) getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003040)) fstat(0xffffffffffffffff, &(0x7f0000003080)) getgid() getpgid(0xffffffffffffffff) getuid() lstat(&(0x7f0000003100)='./file0\x00', &(0x7f0000003140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000031c0)) lstat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)) getgroups(0x0, &(0x7f00000032c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003300)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003340)={{{@in=@multicast1, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000003440)=0xe8) stat(&(0x7f0000003480)='./file0\x00', &(0x7f00000034c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000003540), &(0x7f0000003580)=0xc) geteuid() lstat(&(0x7f00000035c0)='./file0\x00', &(0x7f0000003600)) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003a00)={{{@in=@multicast1, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in=@rand_addr}}, &(0x7f0000003b00)=0xe8) getgroups(0x0, &(0x7f0000003b40)) getpgid(0x0) fstat(0xffffffffffffffff, &(0x7f0000003b80)) getresgid(&(0x7f0000003c00), &(0x7f0000003c40), &(0x7f0000003c80)) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003cc0)={{{@in=@remote, @in6=@remote}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000003dc0)=0xe8) getresgid(&(0x7f0000003e00), &(0x7f0000003e40), &(0x7f0000003e80)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000003ec0)) stat(&(0x7f0000003f00)='./file0\x00', &(0x7f0000003f40)) stat(&(0x7f0000003fc0)='./file0\x00', &(0x7f0000004000)) gettid() lstat(&(0x7f0000005680)='./file0\x00', &(0x7f00000056c0)) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000005780)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000005740)='md5sum\x00', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000057c0), &(0x7f0000005800)=0xc) lstat(&(0x7f0000005840)='./file1\x00', &(0x7f0000005880)) getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000005900), &(0x7f0000005940), &(0x7f0000005980)) getresgid(&(0x7f00000059c0), &(0x7f0000005a00), &(0x7f0000005a40)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005a80)) lstat(&(0x7f0000005b80)='./file0\x00', &(0x7f0000005bc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005cc0), 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000006c0)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") 03:40:00 executing program 5: getgroups(0x3ffffe5e, &(0x7f0000000040)) io_setup(0x0, &(0x7f0000000ac0)) getgid() lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) getresgid(&(0x7f0000000cc0), &(0x7f00000004c0), &(0x7f0000000d40)) getgid() getgroups(0x1f4, &(0x7f0000000500)) fstat(0xffffffffffffffff, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000240)=0xc) add_key(&(0x7f0000000380)='.dead\x00', &(0x7f0000000400), &(0x7f00000008c0), 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000009c0)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000a00)) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000006c0)) setgroups(0x0, &(0x7f00000004c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000dc0), 0x4) memfd_create(&(0x7f0000000780)='\\\x00', 0x0) clock_adjtime(0x0, &(0x7f0000000280)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f0000000840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000b80), 0x0, &(0x7f0000000c00)}, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000480), &(0x7f0000000740)) syz_execute_func(&(0x7f0000000b40)="42805da0c26969ef69dc00d9906920375137c339392a8e0f38211a0fdcd664a741fae0400f01ef1ae5e5e57545460f44352f7d00001a1a01460f01ee31a3b786e298262e64f30f2b05090000003f") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000600)) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000640)={'TPROXY\x00'}, &(0x7f0000000680)=0x1e) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0), 0x4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000f80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f00000005c0)=0xc) 03:40:01 executing program 1: clock_getres(0x3ffffffffffd, &(0x7f00000000c0)) prctl$void(0x0) dup2(0xffffffffffffffff, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000b40), 0xc) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/mls\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, @thr={&(0x7f0000000600), &(0x7f0000000700)}}, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000840)) clock_gettime(0x0, &(0x7f0000000880)) timer_settime(0x0, 0x0, &(0x7f00000008c0), &(0x7f0000000900)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000200)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in=@dev, @in6=@dev}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000800)={0x18}, 0x291) rt_sigtimedwait(&(0x7f0000000940), &(0x7f00000009c0), &(0x7f0000000a00)={0x0, 0x989680}, 0x8) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) gettid() ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000a40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x1e, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0xffffffffffffffff}, 0x30) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)=""/227) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000b00), 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000280)) ioctl$void(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a60860008c1cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:40:02 executing program 4: getuid() ioprio_get$uid(0x0, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000002580)=@xdp, &(0x7f00000002c0)=0x80, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000002600)) futex(&(0x7f0000000240), 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000140), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_execute_func(&(0x7f0000000300)="42805da0bf6d66440fd5c3ef69dc221f2122224ac37c41ff0fd9fb34030f38211a67430f4bc50fe0f3410feefaa620780175456467f2430f10af00000000c4010d64ac1e5d31a3b7e2989f3f") 03:40:02 executing program 1: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) select(0x40, &(0x7f0000000680), &(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) prctl$setfpexc(0xc, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffb000/0x4000)=nil) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000200)=""/112, 0x70, 0x0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='cdg\x00', 0x4) munlockall() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f00000002c0)) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200), &(0x7f0000000500)) syz_execute_func(&(0x7f0000000240)="428055a0ab878769ef69dc00d9868441ff0f1837373add0ec19086fbd9f28fc423b17ac7f2c4217c291a0feefac4e14b2a492d64f04008346d00000000237532bbbbe33f7878095da358b70647ff745c1e9f7f") timer_create(0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, @thr={&(0x7f0000000380), &(0x7f0000000440)}}, &(0x7f0000000580)) timer_delete(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'team0\x00'}) 03:40:02 executing program 4: add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000000640), 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000400)='keyring\x00', &(0x7f00000000c0), &(0x7f0000000040)="2a6465a53941957ca8e5e5a54e267d50d64b30ea7700000000", 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/fuse\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000280), 0x2e9) mmap(&(0x7f0000bff000/0x400000)=nil, 0x400000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/full\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000940)='/dev/rtc0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='cgroup.controllers\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000002c0)) inotify_init1(0x0) prctl$void(0x0) syz_genetlink_get_family_id$team(&(0x7f0000000840)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in6}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@dev, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@loopback, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000a00)=0x14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c80)={{{@in=@broadcast, @in=@remote}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000700)=0x41) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001080)={{{@in=@remote, @in6=@ipv4={[], [], @dev}}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xffffffffffffffe2) accept4$packet(0xffffffffffffffff, &(0x7f0000004300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004340)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@loopback, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000004480)=0xfffffffffffffc4e) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000004580)={0x0, @broadcast, @dev}, &(0x7f00000045c0)=0x8b) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000047c0)={@mcast2}, &(0x7f0000004800)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004840)={@remote}, &(0x7f0000004880)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f00000048c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004900)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004a00)={'veth0\x00'}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004a80)=0xfffffffffffffd2d) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004ac0)={{{@in6, @in=@rand_addr}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000004bc0)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f0000008e00), 0x0, 0x0, &(0x7f0000008f80)={0x0, 0x1c9c380}) accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000009000)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'team0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000ee00)={{{@in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000440)=0x167) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000010040)={0x0, @loopback, @dev}, &(0x7f0000000240)=0xff10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@mcast2, @in6}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f00000006c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000010200)={{{@in6=@remote, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000010300)=0xe8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000010ec0)={&(0x7f0000000080), 0xc, &(0x7f0000010e80)={&(0x7f0000000c80)=ANY=[]}}, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0510fef69dc0f01ee0dce41cbff9191a33d062900770f78993d233d23410feefa6b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:40:04 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) getitimer(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) 03:40:05 executing program 0: eventfd2(0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x0, 0x0) getpid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000008c0)={{{@in, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000009c0)=0xe8) getgroups(0x0, &(0x7f0000000a00)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000a40)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)) getgroups(0x0, &(0x7f0000000b40)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002100)) fstat(0xffffffffffffffff, &(0x7f0000002140)) fstat(0xffffffffffffffff, &(0x7f00000021c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003d00)) fstat(0xffffffffffffffff, &(0x7f0000002280)) lstat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000023c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002400)={{{@in6=@loopback, @in=@multicast2}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000002500)=0xe8) stat(&(0x7f0000002540)='./file0\x00', &(0x7f0000002580)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) getresuid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)) getgid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002740)) getuid() lstat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) fcntl$getown(0xffffffffffffffff, 0x9) stat(&(0x7f0000002f40)='./file0\x00', &(0x7f0000002f80)) fstat(0xffffffffffffffff, &(0x7f0000003000)) getpid() geteuid() getgroups(0x0, &(0x7f0000003080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000030c0)) lstat(&(0x7f0000002240)='./file0\x00', &(0x7f0000003140)) getgroups(0x0, &(0x7f00000031c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003200)) stat(&(0x7f0000003240)='./file0\x00', &(0x7f0000003280)) fstat(0xffffffffffffffff, &(0x7f0000003300)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000035c0)) stat(&(0x7f0000003600)='./file0\x00', &(0x7f0000003640)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000036c0), &(0x7f0000003700)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003740)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000003780)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000003880)=0xe8) getgroups(0x0, &(0x7f00000038c0)) gettid() getuid() stat(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:40:05 executing program 1: pipe(&(0x7f0000000240)) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000480), &(0x7f0000000140)=0x4) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) utime(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000680)) pipe2(&(0x7f0000000340), 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000002c0)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000280)={0x0, &(0x7f0000000240)}) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6, @in6=@mcast1}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) getegid() getpid() getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000a40)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000b40), &(0x7f0000000b80)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000bc0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) getgroups(0x0, &(0x7f0000000c80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000cc0), &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000d40)={{{@in=@rand_addr, @in=@loopback}}, {{@in=@multicast2}}}, &(0x7f0000000e40)=0xe8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000001140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001180), &(0x7f00000011c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001280), &(0x7f00000012c0)=0xc) fcntl$getown(0xffffffffffffffff, 0x9) lstat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)) getgid() gettid() lstat(&(0x7f0000002840)='./file0/file0\x00', &(0x7f0000002880)) getgroups(0x4000035a, &(0x7f0000002900)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002d00), &(0x7f0000002d40)=0xfffffffffffffe1a) lstat(&(0x7f0000002d80)='./file0\x00', &(0x7f0000002dc0)) fstat(0xffffffffffffffff, &(0x7f0000002e40)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002ec0)) syz_execute_func(&(0x7f0000000300)="428055a0876969ef69dc00d9ce41ff0f1837370f38211ac4c19086d9f28fc9410feefa4e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706e2989f7f") 03:40:05 executing program 4: truncate(&(0x7f0000000240)='./file0\x00', 0x0) memfd_create(&(0x7f00000002c0)='ns/ipc\x00', 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000340)={'eql\x00', {0x2, 0x0, @multicast1}}) seccomp(0x0, 0x0, &(0x7f0000000100)) getresuid(&(0x7f0000002d40), &(0x7f0000004080), &(0x7f00000040c0)) fstat(0xffffffffffffff9c, &(0x7f0000004180)) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000500)) lstat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)) getresgid(&(0x7f0000004380), &(0x7f00000043c0), &(0x7f0000004400)) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f00000026c0)='system.posix_acl_default\x00', &(0x7f0000000540)=ANY=[], 0x0, 0x0) utime(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) ustat(0x0, &(0x7f0000000140)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f0000001840), 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000580)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)) gettid() getpgrp(0xffffffffffffffff) getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000480)) getpgid(0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000400)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") 03:40:05 executing program 2: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000140), &(0x7f0000000180)="f2", 0x1, 0xfffffffffffffffe) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) io_setup(0x0, &(0x7f00000001c0)) io_destroy(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000340)={'vcan0\x00', @broadcast}) keyctl$get_security(0x11, 0x0, &(0x7f0000000380)=""/251, 0xfb) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000600)={0x14}, 0x14) write$eventfd(0xffffffffffffffff, &(0x7f0000000240), 0x8) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getgid() lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000480)) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000500)) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) keyctl$set_timeout(0xf, 0x0, 0x0) getgid() socket$inet6_tcp(0xa, 0x1, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ion\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getegid() getgroups(0x0, &(0x7f0000000600)) getpgrp(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000800)={'bridge_slave_1\x00', {0x2, 0x0, @dev}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@remote}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) socket$inet(0x2, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='trusted.overlay.origin\x00', &(0x7f0000000700)='y\x00', 0x2, 0x0) syz_execute_func(&(0x7f0000000280)="42805da00d0fef69dc640f1750000dce0ecf41cb410f38053f260f4fb6fd000000a33d062900770f789933d23d674141b1d8c70b00000244fe80cc39390f383065f047fe06bae5e5e575450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f3f") 03:40:06 executing program 1: clock_getres(0x0, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffff9c) pipe2$9p(&(0x7f0000000180), 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a00)) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) openat$null(0xffffffffffffff9c, &(0x7f0000003340)='/dev/null\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) getpgid(0x0) signalfd(0xffffffffffffff9c, &(0x7f0000004a80), 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004b00)) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000500)=0x30) getresuid(&(0x7f00000003c0), &(0x7f0000004b80), &(0x7f0000000300)) gettid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000600)="42805da0250fef69dc0f01ee0dce41ff0fc4a33d062900770f78990f7beefafa2179660f38302fe5e54175450f2e1a400fbcc1c44379dfb9d6adbe90dfe2989f3f") getresgid(&(0x7f0000000140), &(0x7f0000000380), &(0x7f00000004c0)) syz_execute_func(&(0x7f0000000400)="42805da0510fef69dc0595c3300dcece3e420ff2c69fe502158e7e0c91a33d062900770f78993d233d23417e0f6eee80eb0a38f6eeba39290f38c4827d20c9c4a17a113499fee60f2e2178210d64ac1e5df33e43db4e32") 03:40:07 executing program 4: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x6c8, &(0x7f0000000200)}) set_tid_address(&(0x7f00000001c0)) mknod(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000400)="f447504c73797374656d24657468302e2d6e6f64657665746831776c616e3100", 0xffffffffffffffff}, 0x30) ioprio_get$pid(0x0, 0x0) munlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) pipe2(&(0x7f0000000080), 0x0) setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) pipe2(&(0x7f0000000580), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a80)={{{@in=@dev, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xfffffffffffffda6) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000b80)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@local}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000006c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000700)) getpriority(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="428055a02e6969ef69dc00d9f4e37d0fe1ff6920375137c339392a8e0f38211a40a564a741dfe0400f01efe5e5417545800f2e1a1a01460f01eec46219b98100000000262e6426f30f2b05090000003f") eventfd(0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 03:40:09 executing program 5: mmap(&(0x7f000090c000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000600)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000000c0)) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f00000001c0), 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000740)=ANY=[]) syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x59fe4}]}) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000180)) syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000a00)={{{@in6}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in=@local, @in6=@remote}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@loopback}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000c00)={{{@in=@multicast2, @in=@local}}, {{@in=@rand_addr}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e00)={{{@in=@remote, @in=@broadcast}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000f00)=0xe8) syz_execute_func(&(0x7f0000000040)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000007ec0)) syz_execute_func(&(0x7f0000000180)="428055a06b6969ef69dc00d99069203737c3397c2a060f38211a40a564a741dfe0400f01efe5e54175457d0f2e1a1a01460f01ee31a3b786e2989f3f") 03:40:09 executing program 1: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000000)=""/19, 0xfffffc84) write$binfmt_elf32(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c460608fb04ff0100000000000003003e00000000009300000038000000be0200007f000000010020000200e5f0ffff06000000000051e574640180000087080000000000000200000004"], 0x4d) 03:40:09 executing program 3: alarm(0x0) clock_getres(0x0, &(0x7f0000000140)) prctl$setmm(0x1b, 0x0, &(0x7f0000ff6000/0x9000)=nil) gettid() openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000140)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000002440)="428055a0726969ef69dc00d99069203737c3397c2a060f38211a40a564a70f157a9e400f01efe5e5417545c462010d42002e1a1a3ef0f6585501ee31a3b786e2989fc4227992749f55") ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d99069203637c3397c2a0f0fcdae300f38211a40a564a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e2989f") 03:40:09 executing program 4: clock_gettime(0x7, &(0x7f0000000480)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f00000000c0)) creat(&(0x7f0000000200)='./file0\x00', 0x0) geteuid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000240)) getuid() seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000500)="428055a0466969ef69dc0f01eec4020d912c3918378776f40f38211ac4c19086d9f28fc9660fc0c16b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe298f3a04257520c2513400000007f") ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=0x1c) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000380), 0x4) 03:40:09 executing program 1: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0xffffffffffff04e5}, &(0x7f0000000140), &(0x7f0000000180)={0x77359400}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000a40)="428055a032b6b6410f140506000000ff0f183736e35cf364dee5d2d2d5f2a60e0e0970020fe9c09f66410b850f00000062c463cd6829f3c4028d97a8587a8f6fee8f2a1812cc789471fac4e14bc22a49052d052d3b19fddd4008356d0000000000f047305cccb241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c4b641dcfdc9c4427d0d1aa4212dfca50000262666430ffb348b1f7f") 03:40:10 executing program 4: unshare(0x1e010a00) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a0336969ef69dc364180c7e041a30f7f7f3766460f38285230c4637905a70d000000c135c935c97d197a0779fb8f2860ceeba679cbff43d0e1460f0da11b000000010d64ac1e5d31a314b706e242d08039c52a7d987b7f") getpid() fstat(0xffffffffffffffff, &(0x7f0000000540)) getegid() openat$null(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/null\x00', 0x0, 0x0) timerfd_create(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000900)) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)) getegid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000a00)) geteuid() fstat(0xffffffffffffff9c, &(0x7f0000000a40)) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000cc0)='/selinux/access\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000d00)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/ptmx\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000d80)) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000dc0), &(0x7f0000000e00)=0x1c, 0x0) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000e40)) pipe2$9p(&(0x7f0000000e80), 0x0) gettid() geteuid() getgid() getpid() lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)) stat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)) socket$packet(0x11, 0x0, 0x300) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001040)='/selinux/status\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000002a00)='/dev/rtc#\x00', 0x0, 0x0) inotify_init1(0x0) syz_open_procfs$namespace(0x0, &(0x7f0000004fc0)='ns/pid_for_children\x00') socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000005000)) socket$unix(0x1, 0x0, 0x0) 03:40:13 executing program 0: ioprio_set$uid(0x3, 0x0, 0x0) pipe2(&(0x7f00000002c0), 0x0) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000240)={0x18}, 0x18) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$packet(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000200)=0x75, 0x0) syz_execute_func(&(0x7f00000004c0)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") setrlimit(0x0, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, &(0x7f00000001c0)) seccomp(0x0, 0x0, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000015c0)) lstat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000016c0), &(0x7f0000001700)=0xc) getresuid(&(0x7f0000001740), &(0x7f0000001780), &(0x7f00000017c0)) lstat(&(0x7f0000001800)='./file0/file0\x00', &(0x7f0000001840)) getpgrp(0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@nfc_llcp, &(0x7f0000000080)=0x80) lstat(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c00), &(0x7f0000001c40)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002880)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000028c0)={{{@in=@loopback, @in=@rand_addr}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f00000029c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0x3d6) getpgrp(0x0) getuid() getgroups(0x0, &(0x7f00000008c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002ac0)) lstat(&(0x7f0000002b00)='.\x00', &(0x7f0000002b40)) 03:40:13 executing program 1: getcwd(&(0x7f0000000040)=""/188, 0xbc) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)) syz_execute_func(&(0x7f0000000040)="428055a0636969ef69dc00d9908a203637c3397c2a0f0fcdae300f38211a40a5647f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 03:40:13 executing program 4: prctl$void(0x15) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000001580)="42805da0aed1d1ef69dc0f01ee660f3a608600088041cb64f30f2b073591913d062900770f78993d233d23410feefa633917660f38302fbae5e5e575450f2e1af0442975e1c44379dfb9d6adbe90dfe2989f567f") 03:40:13 executing program 2: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") fcntl$getown(0xffffffffffffffff, 0x9) getresuid(&(0x7f0000000580), &(0x7f0000000600), &(0x7f0000000640)) signalfd4(0xffffffffffffffff, &(0x7f0000000300), 0x8, 0x0) getresgid(0xfffffffffffffffe, &(0x7f00000003c0), &(0x7f0000000400)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000004c0)) memfd_create(&(0x7f0000000180)='\x00', 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f00000001c0)) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000002c0)={@loopback}, 0x14) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000040)=""/158) recvmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x400000000000058, 0x0, 0x0) poll(&(0x7f0000000200), 0xdb, 0x0) pipe2(&(0x7f0000000140), 0x0) prctl$setendian(0x14, 0x0) syz_execute_func(&(0x7f0000000440)="42805da0be0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000430f01c281b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb0703") 03:40:14 executing program 1: uname(&(0x7f0000000180)=""/110) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='vxfs\x00', 0x0, &(0x7f0000000140)='\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000200)="42805da0cd0fef69dc0f01eece73fe19fa380f38211af3f081a4768cca0000808081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e541757a45450f71f5fbc4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000bc0)) getresgid(&(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000cc0)) getgid() socket$inet6(0xa, 0x0, 0x0) accept(0xffffffffffffff9c, &(0x7f0000000d00)=@ax25, &(0x7f0000000d80)=0x80) epoll_create(0x0) pipe2(&(0x7f0000000dc0), 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000e00)) eventfd(0x0) inotify_init1(0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000e40)='/selinux/checkreqprot\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000e80)='cgroup.subtree_control\x00', 0x2, 0x0) getpgrp(0x0) getgid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000f00)={0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000ec0)='dummy0\x00'}, 0x30) pipe(&(0x7f0000000f40)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)) lstat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)) fcntl$getown(0xffffffffffffff9c, 0x9) fstat(0xffffffffffffffff, &(0x7f0000001400)) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001480), &(0x7f00000014c0)=0xc) socket$inet6_tcp(0xa, 0x1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001500)='/proc/self/net/pfkey\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000001540)) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x0, 0x0, &(0x7f0000000040)=ANY=[], &(0x7f00000015c0)='syzkaller\x00', 0x0, 0x65, &(0x7f0000001600)=""/101}, 0x48) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001700)='/dev/ptmx\x00', 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001740)='/dev/rtc0\x00', 0x0, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/checkreqprot\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000017c0)='/selinux/enforce\x00', 0x0, 0x0) creat(&(0x7f0000001800)='./file1\x00', 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) accept4$unix(0xffffffffffffff9c, &(0x7f0000001840), &(0x7f00000018c0)=0x6e, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001900)='/selinux/enforce\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001c00)) getresgid(&(0x7f0000001c40), &(0x7f0000001c80), &(0x7f0000001cc0)) 03:40:14 executing program 4: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) getpid() fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000100)) fstat(0xffffffffffffffff, &(0x7f0000000380)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@remote, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@rand_addr}}, &(0x7f00000009c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000b00)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000b40)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in6=@local, @in=@multicast2}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f0000000cc0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000dc0)={{{@in=@multicast1, @in6=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000ec0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000000f00)) fstat(0xffffffffffffffff, &(0x7f0000000f80)) getresgid(&(0x7f0000001000), &(0x7f0000001040), &(0x7f0000001080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000010c0), &(0x7f0000001100)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001140), &(0x7f0000001180)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f00000011c0), 0x24, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000140)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "aabc7d", 0x44, 0x0, 0x0, @local, @ipv4={[], [], @dev}, {[], @gre}}}}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000002c0)={@mcast1}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) ioctl$BLKREPORTZONE(0xffffffffffffffff, 0xc0101282, &(0x7f0000000640)) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[], 0x0) syz_execute_func(&(0x7f0000000300)="42805da0876969ef69dc00d9f0008f00008020c421fa7fb432322333331f1c3728372838211ac4c19086d9f28fc92665984e2179fbe5e54175450f2e1ac4010d64ac1e5d31a3b706c4c1c05659009f4b") ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)) pipe(&(0x7f0000000240)) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000d00)=""/165) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@remote, @in6}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) syz_execute_func(&(0x7f00000005c0)="428055a0aa878769ef69dc00d9ce8441ff0f1837370f38211ac4c19086fbd9f28fc9c90feefa4e2179fbc6f8fe237532c6c62e1a55010d64ac1e5da358b706b7989f7f") 03:40:16 executing program 5: ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000480), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/protocols\x00') getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300), &(0x7f0000000340)=0x4) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000003c0)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) tkill(0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000500)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000040)=""/36) add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0), &(0x7f0000000300), 0x0, 0xfffffffffffffff8) 03:40:16 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) tee(r1, r2, 0x1, 0x0) 03:40:16 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) set_thread_area(&(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') clone(0x0, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x388, 0x0) dup2(r0, r1) 03:40:16 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000540), &(0x7f0000000640)=0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000280)=0xfffffffffffffff9, 0x4) mkdir(&(0x7f0000000440)='./file0/bus\x00', 0x4) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0), &(0x7f0000000300), 0x0, 0xffffffffffffffff) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180)={0x6d, 0x3}, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000580)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000700)=""/163, 0xa3}, {&(0x7f00000002c0)=""/58, 0x3a}], 0x2, &(0x7f0000000840)=""/88, 0x58, 0x4}, 0x20) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40020000) r3 = creat(&(0x7f0000000200)='./file0/bus\x00', 0x20) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') readv(r2, &(0x7f0000000cc0)=[{&(0x7f00000009c0)=""/178, 0xb2}, {&(0x7f0000000a80)=""/77, 0x4d}, {&(0x7f0000000800)=""/36, 0x24}, {&(0x7f0000000b00)=""/228, 0xe4}, {&(0x7f0000000c00)=""/80, 0x50}, {&(0x7f0000000c80)=""/62, 0x3e}], 0x6) ioctl$KDDISABIO(r3, 0x4b37) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000900)={0x98, r4, 0x502, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0xffffffffffffff0d}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffe00}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}]}, 0x98}}, 0x4000080) r5 = creat(&(0x7f0000000680)='./file0/bus\x00', 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000000141044, 0x0) ioctl(r6, 0x6611, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) vmsplice(r2, &(0x7f0000000dc0)=[{&(0x7f0000000d40)="3d4f92655d31d7937d53c3c81570d6418243aa0cdbdbb0f3e4773f8c89896c7341ed0e3bd22ba3b62f3c59da7273873df05061121b1a2354bce908542fec37d168e25dab551ebc5b737fd1dc1d6efeb34649e07248e00b9f476fdc085d4c209b81e0f627b70de8d7ada099a1", 0x6c}], 0x1, 0x3) getsockopt$sock_timeval(r5, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x10) r8 = getpgrp(r7) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x9) getsockopt$inet_udp_int(r6, 0x11, 0xa, &(0x7f00000006c0), &(0x7f00000007c0)=0x4) syz_open_procfs$namespace(r8, &(0x7f0000000380)='ns/ipc\x00') 03:40:16 executing program 3: mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) keyctl$set_reqkey_keyring(0x2, 0x0) pipe(&(0x7f00000001c0)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000200)) clock_getres(0x0, &(0x7f00000000c0)) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) seccomp(0x0, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000240)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='threaded\x00', 0x9) syz_execute_func(&(0x7f00000001c0)="42805da0c60fef69dc0f01eecec273fefefa380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e56b6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000003c0)=""/4096, 0x1000, 0x0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) syz_execute_func(&(0x7f0000000340)="42805da0690fef69dc0f01eece41ff0f1837370f38211ac4c19086d9f28fc9410feefa6b2179a6e5e54175450f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfe2989f7f") 03:40:16 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) tee(r1, r2, 0x1, 0x0) 03:40:17 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) set_thread_area(&(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') clone(0x0, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x388, 0x0) dup2(r0, r1) 03:40:17 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) set_thread_area(&(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') clone(0x0, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x388, 0x0) dup2(r0, r1) 03:40:17 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) tee(r1, r2, 0x1, 0x0) 03:40:17 executing program 4: clone(0x210007fa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = getpid() pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) tee(r1, r2, 0x1, 0x0) 03:40:17 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) set_thread_area(&(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') clone(0x0, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x388, 0x0) dup2(r0, r1) 03:40:17 executing program 4: mount(&(0x7f0000000500)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000c00)='qnx6\x00', 0x0, &(0x7f0000000cc0)='mangle\x00') creat(&(0x7f0000000c40)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@mcast1}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000180)={0x0, 0x1, 0x6, @local}, 0x10) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000c80)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)}, 0x10) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0), 0xc) sched_getattr(0x0, &(0x7f0000000480), 0x30, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f00000001c0)) dup(0xffffffffffffffff) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000300)) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000780)=ANY=[], 0x0) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d00), &(0x7f0000000d40)=0xc) getgid() getuid() fstat(0xffffffffffffffff, &(0x7f0000000d80)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001c40)={{{@in=@loopback}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000001d40)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001d80), &(0x7f0000001dc0)=0xc) lstat(&(0x7f00000039c0)='./file0\x00', &(0x7f0000003a00)) getresgid(&(0x7f0000003a80), &(0x7f0000003ac0), &(0x7f0000003b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000054c0)={{{@in6=@mcast2, @in6=@dev}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000055c0)=0xe8) stat(&(0x7f0000005600)='./file0\x00', &(0x7f0000005640)) getresuid(&(0x7f00000056c0), &(0x7f0000005700), &(0x7f0000005740)) lstat(&(0x7f0000005780)='./file0\x00', &(0x7f00000057c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005840), &(0x7f0000005880)=0xc) getegid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000058c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f00000059c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000005a00), &(0x7f0000005a40)=0xc) lstat(&(0x7f0000005d00)='.\x00', &(0x7f0000005d40)) getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006240)={{{@in=@broadcast, @in=@local}}, {{@in6}, 0x0, @in6=@dev}}, &(0x7f0000006340)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006380), &(0x7f00000063c0)=0xc) getuid() getresgid(&(0x7f00000067c0), &(0x7f0000006800), &(0x7f0000006840)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006880)={{{@in=@rand_addr}}, {{@in=@dev}, 0x0, @in6=@remote}}, &(0x7f0000006980)=0xe8) getgroups(0x0, &(0x7f00000069c0)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006a00)={{{@in=@dev, @in=@loopback}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000006b00)=0xe8) getegid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006b40)={{{@in6=@mcast1, @in6=@remote}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000006c40)=0xe8) lstat(&(0x7f0000006c80)='./file0\x00', &(0x7f0000006cc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000006e00), 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) fcntl$getown(0xffffffffffffffff, 0x9) time(&(0x7f0000000340)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000380), 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002180), &(0x7f0000000240)=0xc) getpid() 03:40:23 executing program 5: setpriority(0x0, 0x0, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000300)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000240), &(0x7f00000003c0)=0x14) syz_emit_ethernet(0x0, &(0x7f0000000380)=ANY=[], 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={@remote, @local}, &(0x7f0000000700)=0xc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @remote}, 0x2cc) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000400), 0x32a) futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x989680}, &(0x7f00000000c0), 0x0) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) getegid() write$P9_RFLUSH(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x7) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000200), 0x8) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000540)) syz_execute_func(&(0x7f0000000040)="428055a0626969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000440)) syz_execute_func(&(0x7f00000001c0)="428055a0876969ef69dc00d990c841ff0f1837370f38211ac4c4e1f96f184e2179fb85e5f2420f1160cb5d0f2e1afb010d64ac1e5d31a3b786e2987f") 03:40:23 executing program 1: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) set_thread_area(&(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') clone(0x0, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x388, 0x0) dup2(r0, r1) 03:40:23 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) pwritev(r0, &(0x7f0000000240), 0x1, 0x0) 03:40:31 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000540), &(0x7f0000000640)=0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000280)=0xfffffffffffffff9, 0x4) mkdir(&(0x7f0000000440)='./file0/bus\x00', 0x4) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0), &(0x7f0000000300), 0x0, 0xffffffffffffffff) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180)={0x6d, 0x3}, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000580)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000700)=""/163, 0xa3}, {&(0x7f00000002c0)=""/58, 0x3a}], 0x2, &(0x7f0000000840)=""/88, 0x58, 0x4}, 0x20) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40020000) r3 = creat(&(0x7f0000000200)='./file0/bus\x00', 0x20) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') readv(r2, &(0x7f0000000cc0)=[{&(0x7f00000009c0)=""/178, 0xb2}, {&(0x7f0000000a80)=""/77, 0x4d}, {&(0x7f0000000800)=""/36, 0x24}, {&(0x7f0000000b00)=""/228, 0xe4}, {&(0x7f0000000c00)=""/80, 0x50}, {&(0x7f0000000c80)=""/62, 0x3e}], 0x6) ioctl$KDDISABIO(r3, 0x4b37) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000900)={0x98, r4, 0x502, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0xffffffffffffff0d}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffe00}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}]}, 0x98}}, 0x4000080) r5 = creat(&(0x7f0000000680)='./file0/bus\x00', 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x100000000141044, 0x0) ioctl(r6, 0x6611, &(0x7f0000000080)) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) vmsplice(r2, &(0x7f0000000dc0)=[{&(0x7f0000000d40)="3d4f92655d31d7937d53c3c81570d6418243aa0cdbdbb0f3e4773f8c89896c7341ed0e3bd22ba3b62f3c59da7273873df05061121b1a2354bce908542fec37d168e25dab551ebc5b737fd1dc1d6efeb34649e07248e00b9f476fdc085d4c209b81e0f627b70de8d7ada099a1", 0x6c}], 0x1, 0x3) getsockopt$sock_timeval(r5, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x10) r8 = getpgrp(r7) write$cgroup_type(r5, &(0x7f0000000140)='threaded\x00', 0x9) getsockopt$inet_udp_int(r6, 0x11, 0xa, &(0x7f00000006c0), &(0x7f00000007c0)=0x4) syz_open_procfs$namespace(r8, &(0x7f0000000380)='ns/ipc\x00') 03:40:31 executing program 3: munlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000640), &(0x7f00000009c0), 0x0, 0xfffffffffffffff9) geteuid() getpid() perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000000800)=""/202, 0xca) setitimer(0x0, &(0x7f0000000080), &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@nl=@proc, &(0x7f00000003c0)=0xfffffffffffffe6d, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000006c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000600), 0xc, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[]}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000500)=0xe8) sendto$packet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000380), 0x14) getpid() pipe2(&(0x7f0000000140), 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00') seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="42805da0cf0fef69dc0f01eece73fe19fa380f38211af3f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b744dbe271fb26f00fbb9500000000") ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) setpriority(0x0, 0x0, 0x0) 03:40:31 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) set_thread_area(&(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') clone(0x0, &(0x7f0000000400), &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f000000d8c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}], 0x388, 0x0) dup2(r0, r1) 03:40:31 executing program 1: getrusage(0x0, &(0x7f0000000800)) seccomp(0x0, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='eth1\x00', 0xffffffffffffff9c}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00'}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@rand_addr, @multicast2}, &(0x7f0000000340)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in=@dev, @in6=@mcast1}}, {{@in6=@mcast2}}}, &(0x7f0000000480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000500)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000000600), &(0x7f0000000640)=0x14, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000006c0)={0x0, @rand_addr}, &(0x7f0000000700)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@remote, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000005c0)=ANY=[], 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000540)={{0x0, @loopback, 0x0, 0x0, 'lblcr\x00'}, {@rand_addr}}, 0x44) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000a00)={{{@in=@loopback, @in6=@local}}, {{@in6=@remote}}}, &(0x7f0000000b00)=0xe8) 03:40:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) pwritev(r0, &(0x7f0000000240), 0x1, 0x0) 03:40:31 executing program 5: getpid() getpgid(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) getpid() syz_open_procfs$namespace(0x0, 0xffffffffffffffff) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002cc0)={{{@in=@local, @in=@multicast2}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000002dc0)=0xe8) stat(&(0x7f0000002e00)='./file0\x00', &(0x7f0000000140)) getpid() getresuid(&(0x7f0000003440), &(0x7f0000003480), &(0x7f00000034c0)) lstat(&(0x7f0000003500)='./file0\x00', &(0x7f0000003540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000035c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003600)={{{@in=@loopback, @in=@rand_addr}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000003700)=0xe8) getresgid(&(0x7f0000000280), &(0x7f0000003780), &(0x7f00000037c0)) fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003800)={{{@in=@loopback, @in6=@loopback}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000003900)=0xe8) getgroups(0x0, &(0x7f0000003940)) getpid() getuid() getresgid(&(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003a40)) getresuid(&(0x7f0000003a80), &(0x7f0000003ac0), &(0x7f0000003b00)) lstat(&(0x7f0000003b40)='./file0\x00', &(0x7f0000003b80)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003c40)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000003c00)='\x00'}, 0x30) getresgid(&(0x7f0000003c80), &(0x7f0000003cc0), &(0x7f0000003d00)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006340), &(0x7f0000006380)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000063c0)={{{@in=@loopback, @in=@broadcast}}, {{}, 0x0, @in=@local}}, &(0x7f00000064c0)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000006500)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000006a80)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006ac0), &(0x7f0000006b00)=0xc) getresgid(&(0x7f0000006b40), &(0x7f0000006b80), &(0x7f0000006bc0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006c00)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006c40)={{{@in6, @in=@broadcast}}, {{@in6=@loopback}}}, &(0x7f0000006d40)=0xe8) lstat(&(0x7f0000006d80)='./file0\x00', &(0x7f0000006dc0)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000007180), 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0), 0x4) getpgrp(0xffffffffffffffff) write$FUSE_LK(0xffffffffffffffff, &(0x7f0000000200)={0x28}, 0x28) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) dup(0xffffffffffffffff) syz_execute_func(&(0x7f0000000680)="428055a032b6b6c4e1785a7104ff0f183736e33a85ddd2d2d5f2a60e0e097002660f3838d69f66410b850f00000062c463cd6829f3c4028d97a8587a8f6feefac4e14bc22a49052d052de119fddd4008356d0000000000753241801b00656464f3446da03333420f709427771a69a500e3c4c13b7c12c441dc14c96767f340a4212dfca50000262666430ffb348b1f7f") 03:40:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) pwritev(r0, &(0x7f0000000240), 0x1, 0x0) 03:40:32 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000000)) pwritev(r0, &(0x7f0000000240), 0x1, 0x0) 03:40:32 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) getresgid(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)) getegid() pipe2(&(0x7f00000000c0), 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000740)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@rand_addr, @in6=@loopback}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000880)=0xe8) recvmsg(0xffffffffffffffff, &(0x7f0000001180)={&(0x7f0000000ac0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001000), 0x0, &(0x7f0000001080)=""/217, 0xd9}, 0x0) getpid() geteuid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000025c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002600), &(0x7f0000002640)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002680)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000026c0), &(0x7f0000002700)=0xc) stat(&(0x7f0000002900)='./file0\x00', &(0x7f0000002940)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000029c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002a00)={{{@in=@multicast2, @in6}}, {{@in=@local}}}, &(0x7f0000002b00)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000002880)) getuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004180)={{{@in=@remote, @in6=@local}}, {{@in=@rand_addr}}}, &(0x7f0000004280)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000042c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004300)={{{@in6=@mcast1, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000004400)=0xe8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000007d40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000007d00)='\x00'}, 0x30) getuid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000007d80)) getresuid(&(0x7f00000001c0), &(0x7f0000000180), &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007e80), &(0x7f0000007ec0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000007f00)={{{@in6=@remote, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000008000)=0xe8) getpid() getuid() getpgrp(0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000008280)={{{@in=@remote, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000008380)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000083c0)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000008400)={{{@in, @in6=@mcast2}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000008500)=0xe8) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000086c0)={{{@in=@multicast2, @in6}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@mcast2}}, &(0x7f00000087c0)=0xe8) gettid() lstat(&(0x7f0000008800)='./file0\x00', &(0x7f0000008840)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000088c0)) lstat(&(0x7f0000008900)='./file0\x00', &(0x7f0000008940)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000340)="42805da0bd0fef69dc0f01eece73fe19fa380f38211af3f0817e768cc80000000081b5e5bc2b0000002167f00fbab204000000ca6b2179dae5e54175450f2e1ac4010d64ac1e5d31a3b74472e671fb0703") 03:40:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000000)=@setlink={0x3c, 0x13, 0x6b5659910692d25f, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'syz_tun\x00'}, @IFLA_MASTER={0x8, 0xa, 0x4}]}, 0x3c}}, 0x0) 03:40:32 executing program 1: capget(&(0x7f00000000c0)={0x20080522}, &(0x7f00000001c0)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180), 0x0, 0x0, 0xfffffffffffffffa) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000300)={{{@in=@multicast1, @in=@dev}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) getresgid(&(0x7f0000000280), &(0x7f0000000480), &(0x7f0000000440)) keyctl$chown(0x4, 0x0, 0x0, 0x0) clock_settime(0x0, &(0x7f00000001c0)={0x0, 0x989680}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f00000001c0)="42805da0ca24a3a3ef69dc0f01ee0dce41cbff9191a33d06290028770f0f993d233d234142d85d096b2179660f38302fbae5e5e575450f2e1ac4010d64ac1e5d31a3b7e29873bb7f") creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001500)) 03:40:32 executing program 4: mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000140)=""/125) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x58fe4}]}) eventfd(0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080), 0x0, 0x0, 0xfffffffffffffffc) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14}, 0x14}}, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f00000002c0)) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)) keyctl$get_keyring_id(0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000040)) syz_execute_func(&(0x7f00000003c0)="42805da0c60fef69dc0f01eecec273fef3ad380f387c366766460f38286200f081768cc8000000c481b5e5bc2b0000002167f00fbab204000000ca6b21799cdae5e5f3470faecf6a410febbd09000000800f2e1ac4010d64ac1e5d31a3b744dbe271fb3e3636f7c02c33ffff") INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes [ 3009.670868] INFO: task kworker/0:5:18635 blocked for more than 140 seconds. [ 3009.678001] Not tainted 4.9.128+ #40 [ 3009.690514] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3009.698492] kworker/0:5 D29432 18635 2 0x00000000 [ 3009.713392] Workqueue: events linkwatch_event [ 3009.717993] ffff88018ff58000 ffff880182484200 ffff880182484200 ffff880185db8000 [ 3009.745690] ffff8801db621018 ffff88019e9d7ae8 ffffffff8277eeb2 0000000000000002 [ 3009.762452] ffff88018ff588b0 ffffed0031feb115 00ff88018ff58000 ffff8801db6218f0 [ 3009.780532] Call Trace: [ 3009.783145] [] ? __schedule+0x662/0x1b10 [ 3009.788844] [] schedule+0x7f/0x1b0 [ 3009.810529] [] schedule_preempt_disabled+0x13/0x20 [ 3009.817127] [] mutex_lock_nested+0x326/0x870 [ 3009.830525] [] ? rtnl_lock+0x17/0x20 [ 3009.835915] [] ? mutex_trylock+0x3e0/0x3e0 [ 3009.850539] [] ? check_preemption_disabled+0x3b/0x170 [ 3009.857387] [] rtnl_lock+0x17/0x20 [ 3009.880524] [] linkwatch_event+0xe/0x60 [ 3009.886163] [] process_one_work+0x791/0x1470 [ 3009.900519] [] ? process_one_work+0x6d8/0x1470 [ 3009.906755] [] ? cancel_delayed_work_sync+0x20/0x20 [ 3009.930522] [] worker_thread+0xd6/0x10a0 [ 3009.936242] [] ? ___preempt_schedule+0x16/0x18 [ 3009.950520] [] kthread+0x26d/0x300 [ 3009.955714] [] ? process_one_work+0x1470/0x1470 [ 3009.970518] [] ? kthread_park+0xa0/0xa0 [ 3009.976145] [] ? __switch_to_asm+0x34/0x70 [ 3009.982460] [] ? kthread_park+0xa0/0xa0 [ 3009.988094] [] ? kthread_park+0xa0/0xa0 [ 3009.994081] [] ret_from_fork+0x5c/0x70 [ 3009.999611] [ 3009.999611] Showing all locks held in the system: [ 3010.006213] 2 locks held by khungtaskd/24: [ 3010.010434] #0: (rcu_read_lock){......}, at: [] watchdog+0x11c/0xa20 [ 3010.019180] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x79/0x218 [ 3010.028897] 2 locks held by getty/2018: [ 3010.032867] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 3010.042223] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x202/0x16e0 [ 3010.052254] 3 locks held by kworker/1:3/13141: [ 3010.056819] #0: ("%s"("ipv6_addrconf")){.+.+..}, at: [] process_one_work+0x6a0/0x1470 [ 3010.067043] #1: ((addr_chk_work).work){+.+...}, at: [] process_one_work+0x6d8/0x1470 [ 3010.077188] #2: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 3010.085607] 3 locks held by kworker/0:5/18635: [ 3010.090172] #0: ("events"){.+.+.+}, at: [] process_one_work+0x6a0/0x1470 [ 3010.099277] #1: ((linkwatch_work).work){+.+...}, at: [] process_one_work+0x6d8/0x1470 [ 3010.109499] #2: (rtnl_mutex){+.+.+.}, at: [] rtnl_lock+0x17/0x20 [ 3010.117921] [ 3010.119529] ============================================= [ 3010.119529] [ 3010.127476] NMI backtrace for cpu 0 [ 3010.131130] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.128+ #40 [ 3010.137609] ffff8801d9907d08 ffffffff81af2469 0000000000000000 0000000000000000 [ 3010.145652] 0000000000000000 0000000000000001 ffffffff810967d0 ffff8801d9907d40 [ 3010.153681] ffffffff81afd1c9 0000000000000000 0000000000000000 0000000000000003 [ 3010.161701] Call Trace: [ 3010.164278] [] dump_stack+0xc1/0x128 [ 3010.169630] [] ? irq_force_complete_move+0x330/0x330 [ 3010.176374] [] nmi_cpu_backtrace.cold.0+0x48/0x87 [ 3010.182858] [] ? irq_force_complete_move+0x330/0x330 [ 3010.189597] [] nmi_trigger_cpumask_backtrace+0x12c/0x151 [ 3010.196691] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 3010.203696] [] watchdog+0x6ad/0xa20 [ 3010.208957] [] ? watchdog+0x11c/0xa20 [ 3010.214394] [] kthread+0x26d/0x300 [ 3010.219570] [] ? reset_hung_task_detector+0x20/0x20 [ 3010.226222] [] ? kthread_park+0xa0/0xa0 [ 3010.231833] [] ? __switch_to_asm+0x34/0x70 [ 3010.237701] [] ? kthread_park+0xa0/0xa0 [ 3010.243310] [] ? kthread_park+0xa0/0xa0 [ 3010.248918] [] ret_from_fork+0x5c/0x70 [ 3010.254546] Sending NMI from CPU 0 to CPUs 1: [ 3010.259131] NMI backtrace for cpu 1 [ 3010.262757] CPU: 1 PID: 16492 Comm: syz-executor1 Not tainted 4.9.128+ #40 [ 3010.269751] task: ffff880185db8000 task.stack: ffff88019e798000 [ 3010.275789] RIP: 0033:[<000000000040157b>] c [<000000000040157b>] 0x40157b [ 3010.282871] RSP: 002b:00007f27ecf7b690 EFLAGS: 00000282 [ 3010.288303] RAX: 00000000c1274104 RBX: 000000000000000b RCX: 0000000000457679 [ 3010.295556] RDX: 0000000000000000 RSI: 00007f27ecf7b6c0 RDI: 000000000000000b [ 3010.302815] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3010.310081] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 3010.317343] R13: 00000000004d7950 R14: 00000000004c48c6 R15: 0000000000000000 [ 3010.324599] FS: 00007f27ecf7c700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 3010.332812] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3010.338679] CR2: 0000000000cd13e0 CR3: 00000001c888d000 CR4: 00000000001606b0 [ 3010.345935] DR0: 0000000020000000 DR1: 0000000020000000 DR2: 0000000000000000 [ 3010.353191] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 3010.361853] Kernel panic - not syncing: hung_task: blocked tasks [ 3010.368003] CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.128+ #40 [ 3010.374476] ffff8801d9907cc8 ffffffff81af2469 ffffffff82878340 00000000ffffffff [ 3010.382501] 0000000000000000 0000000000000000 dffffc0000000000 ffff8801d9907d88 [ 3010.390527] ffffffff813df985 0000000041b58ab3 ffffffff82c2890b ffffffff813df7c6 [ 3010.398550] Call Trace: [ 3010.401133] [] dump_stack+0xc1/0x128 [ 3010.406480] [] panic+0x1bf/0x39f [ 3010.411481] [] ? add_taint.cold.6+0x16/0x16 [ 3010.417435] [] ? ___preempt_schedule+0x16/0x18 [ 3010.423652] [] ? nmi_trigger_cpumask_backtrace+0x102/0x151 [ 3010.430908] [] watchdog+0x6be/0xa20 [ 3010.436172] [] ? watchdog+0x11c/0xa20 [ 3010.441607] [] kthread+0x26d/0x300 [ 3010.446787] [] ? reset_hung_task_detector+0x20/0x20 [ 3010.453441] [] ? kthread_park+0xa0/0xa0 [ 3010.459054] [] ? __switch_to_asm+0x34/0x70 [ 3010.464931] [] ? kthread_park+0xa0/0xa0 [ 3010.470540] [] ? kthread_park+0xa0/0xa0 [ 3010.476149] [] ret_from_fork+0x5c/0x70 [ 3010.481705] Kernel Offset: disabled [ 3010.485322] Rebooting in 86400 seconds..